Remcos RAT Disguised as VeraCrypt Installer Targets South Korean Users

Related

ApolloMD Data Breach Impacts More Than 620,000

What happened A cyberattack on the Georgia-based healthcare provider ApolloMD...

Atlas Air Ransomware Breach Allegedly Exposes Boeing Technical Data

What happened Attackers claiming affiliation with the Everest ransomware gang...

Threat Actors Leveraging Employee Monitoring and SimpleHelp Tools in Attacks

What happened Security researchers have documented threat actors abusing legitimate...

Palo Alto Networks Firewall Reboot Loop Flaw Affects Next-Generation Devices

What happened A software flaw in Palo Alto Networks next-generation...

Promptware Leveraged Google Calendar Invites in Credential Harvesting Campaign

What happened Security researchers from ReversingLabs have uncovered a malicious...

Share

What happened

A Remcos RAT campaign is masquerading as legitimate VeraCrypt installers to steal login credentials and sensitive information. Security researchers at ASEC reported that the malware spreads via fake database lookup programs for gambling sites and deceptive VeraCrypt installers. The infection chain involves multiple obfuscated VBS and PowerShell stages, ultimately delivering the RAT, which allows full remote control over compromised systems. The malware collects keystrokes, screenshots, and browser-stored credentials, and persists through .NET-based injection and Discord-based command-and-control communications.

Who is affected

Individuals in South Korea, particularly those interacting with illegal online gambling platforms, are directly targeted. General users downloading encryption software may also be at risk.

Why CISOs should care

This campaign demonstrates how malware can disguise itself as trusted software, posing significant operational, financial, and data protection risks.

3 practical actions

  • Validate software downloads: Only use official channels to obtain encryption tools and software.
  • Deploy endpoint protection: Use advanced anti-malware solutions to detect multi-stage RAT infections.
  • Educate users on social engineering: Warn about deceptive files and installers commonly used to distribute malware.