ThreatCluster
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

New Attack Uses Windows Shortcut Files to Install REMCOS Backdoor

Threat Score:
62
Hackread
14 hours ago

Overview

Limited Content Available

We were unable to pull all insights from this article. Clustering, as well as Threat and Business intelligence may be limited.

Security firm Point Wild has exposed a new malware campaign using malicious LNK files to install the REMCOS backdoor. This report details how attackers disguise files to gain full system control....

Continue Reading on Original Site

Related Articles

5 articles
1

New Linux backdoor Plague bypasses auth via malicious PAM module

Security Affairs • 10 hours ago

A stealthy Linux backdoor named Plague, hidden as a malicious PAM module, allows attackers to bypass auth and maintain persistent SSH access. Nextron Systems researchers discovered a new stealthy Linux backdoor called Plague, hidden as a malicious PAM (Pluggable Authentication Module) module. It silently bypasses authentication and grants persistent SSH access. A Pluggable Authentication Module […]

Score
77
Read more
2

2025-08-03 - Cluster AI Daily Threat Brief

ThreatCluster • 10 hours ago

# Daily Threat Intelligence Brief - August 3, 2025 ## Executive Summary Today's threat landscape is increasingly complex and dynamic, with significant activity in ransomware, denial-of-service (DoS) attacks, and sophisticated cyber espionage campaigns. A notable surge in ransomware incidents has been identified, particularly affecting the healthcare sector, as seen in the recent attack on Highlands Oncology Group, which compromised the data of over 113,000 individuals. Additionally, new malwar

Score
71
Read more
3

China Presses Nvidia Over Alleged Backdoors in H20 Chips Amid Tech Tensions

Security Affairs • 12 hours ago

China questioned Nvidia over suspected backdoors in its H20 chips, adding to rising tensions in the tech fight between the U.S. and Beijing. China’s internet watchdog has summoned Nvidia over concerns that its H20 AI chips may contain hidden backdoors. Nvidia H20 chips are AI GPUs tailored for the Chinese market, based on Hopper architecture. […]

Score
71
Read more
4

From Friction to Function: Optimising Onboarding in an Age of AML, AI and Rising Risk

Finextra Security • 19 hours ago

From Friction to Function: Optimising Onboarding in an Age of AML, AI and Rising Risk Join this webinar, hosted in association with nCino, to the challenges of commercial onboarding, particularly in the context of increasing regulations like the EU AML Directive and an emphasis on the importance of data strategy, AI, and streamlining Client Lifecycle Management (CLM). How can banks scale AML compliance in an increasingly complex and high-risk environment without compromising the commercial clien

Score
68
Read more
5

📥 Download the complete threat report to uncover the full scale of the FBI-flagged Funnull DNS infrastructure ->> https://lnkd.in/ehSBvCBx The FBI's recent FLASH alert exposed #Funnull as the backbone of a global cryptocurrency #fraud operation active since - LinkedIn

News • 16 hours ago

EnglishUnited States Deutsch English Español Français Italiano العربية All languages Afrikaans azərbaycan bosanski català Čeština Cymraeg Dansk Deutsch eesti EnglishUnited Kingdom EspañolEspaña EspañolLatinoamérica euskara Filipino FrançaisCanada FrançaisFrance Gaeilge galego Hrvatski Indonesia isiZulu íslenska Italiano Kiswahili latviešu lietuvių magyar Melayu Nederlands norsk o‘zbek polski PortuguêsBrasil PortuguêsPortugal română shqip Slovenčina slovenščina srpski (latinica) Suomi Svenska Tiế

Score
68
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

PLATFORMS
Windows
MALWARE
Remcos
ARTICLE INFORMATION
Article #7333
Published 14 hours ago
Hackread

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration