Article Details
Scrape Timestamp (UTC): 2025-02-05 09:48:34.762
Source: https://thehackernews.com/2025/02/asyncrat-campaign-uses-python-payloads.html
Original Article Text
Click to Toggle View
AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks. A malware campaign has been observed delivering a remote access trojan (RAT) named AsyncRAT by making use of Python payloads and TryCloudflare tunnels. "AsyncRAT is a remote access trojan (RAT) that exploits the async/await pattern for efficient, asynchronous communication," Forcepoint X-Labs researcher Jyotika Singh said in an analysis. "It allows attackers to control infected systems stealthily, exfiltrate data and execute commands while remaining hidden – making it a significant cyberthreat." The starting point of the multi-stage attack chain is a phishing email that contains a Dropbox URL that, upon clicking, downloads a ZIP archive. Present within the file is an internet shortcut (URL) file, which serves as a conduit for a Windows shortcut (LNK) file responsible for taking the infection further, while a seemingly benign decoy PDF document is displayed to the message recipient. Specifically, the LNK file is retrieved by means of a TryCloudflare URL embedded within the URL file. TryCloudflare is a legitimate service offered by Cloudflare for exposing web servers to the internet without opening any ports by creating a dedicated channel (i.e., a subdomain on trycloudflare[.]com) that proxies traffic to the server. The LNK file, for its part, triggers PowerShell to execute a JavaScript code hosted on the same location that, in turn, leads to a batch script (BAT) capable of downloading another ZIP archive. The newly downloaded ZIP file contains a Python payload designed to launch and execute several malware families, such as AsyncRAT, Venom RAT, and XWorm. It's worth noting that a slight variation of the same infection sequence was discovered last year propagating AsyncRAT, GuLoader, PureLogs Stealer, Remcos RAT, Venom RAT, and XWorm. "This AsyncRAT campaign has again shown how hackers can use legitimate infrastructures like Dropbox URLs and TryCloudflare to their advantage," Singh noted. "Payloads are downloaded through Dropbox URLs and temporary TryCloudflare tunnel infrastructure, thereby tricking recipients into believing their legitimacy." The development comes amid a surge in phishing campaigns using phishing-as-a-service (PhaaS) toolkits to conduct account takeover attacks by directing users to bogus landing pages mimicking the login pages of trusted platforms like Microsoft, Google, Apple, and GitHub. Social engineering attacks conducted via emails have also been observed leveraging compromised vendor accounts to harvest users' Microsoft 365 login credentials, an indication that threat actors are taking advantage of the interconnected supply chain and the inherent trust to bypass email authentication mechanisms. Some of other recently documented phishing campaigns in recent weeks are below - Recent research by CloudSEK has also demonstrated that it's possible to exploit Zendesk's infrastructure to facilitate phishing attacks and investment scams. "Zendesk allows a user to sign up for a free trial of their SaaS platform, allowing registration of a subdomain, that could be misused to impersonate a target," the company said, adding attackers can then use these subdomains to deliver phishing emails by adding the targets' email addresses as "users" to the Zendesk portal. "Zendesk does not conduct email checks to invite users. Which means that any random account can be added as a member. Phishing pages can be sent, in the guise of tickets assigned to the email address."
Daily Brief Summary
A new malware campaign uses Dropbox and Cloudflare services to distribute the AsyncRAT remote access trojan via email phishing.
The multi-stage infection starts with a phishing email containing a Dropbox URL, which downloads a ZIP archive with a deceptive PDF and a malicious LNK file.
The LNK file triggers PowerShell to execute JavaScript, leading to a batch script that downloads another ZIP containing Python payloads.
These payloads are capable of executing multiple malware families, including AsyncRAT, Venom RAT, and XWorm, while remaining hidden.
The campaign exploits legitimate infrastructure to trick users into thinking they are interacting with trustworthy sources.
This approach reflects broader phishing trends where services like Microsoft, Google, and Zendesk are manipulated to harvest user credentials or conduct investment scams.
The observed tactics indicate an ongoing increase in sophisticated phishing operations utilizing both social engineering and advanced technical methods.