• Latest
Screensaver malware revives stealthy access tactic — Arabian Post

Screensaver malware revives stealthy access tactic — Arabian Post

February 6, 2026
Prolongation controversée du Parlement de deux ans – Bassil, Geagea et Gemayel unis contre un report jugé anticonstitutionnel

Prolongation controversée du Parlement de deux ans – Bassil, Geagea et Gemayel unis contre un report jugé anticonstitutionnel

March 9, 2026
Pagasa declares end of La Niña, continues to monitor LPA outside PAR

Pagasa declares end of La Niña, continues to monitor LPA outside PAR

March 9, 2026
Kim Yun-ji becomes 1st Korean female to win Winter Paralympic gold

Kim Yun-ji becomes 1st Korean female to win Winter Paralympic gold

March 9, 2026
WELEDA x Stella McCartney: Paris Fashion Week / Skin Food: 100 years of loving skin

WELEDA x Stella McCartney: Paris Fashion Week / Skin Food: 100 years of loving skin

March 9, 2026
Statements Recorded From Over 10 Individuals In Trainee Doctor Death Probe

Statements Recorded From Over 10 Individuals In Trainee Doctor Death Probe

March 9, 2026
Five dead and more feared missing after giant landfill collapses in Indonesia

Five dead and more feared missing after giant landfill collapses in Indonesia

March 9, 2026
Omar Musa on his novel Fierceland, a “deliberate critique” of Conrad’s Heart of Darkness

Omar Musa on his novel Fierceland, a “deliberate critique” of Conrad’s Heart of Darkness

March 9, 2026
In first, Japan to deploy homegrown long-range missiles on March 31

In first, Japan to deploy homegrown long-range missiles on March 31

March 9, 2026
Bolivia Raids Homes Looking for Millions in Cash Taken From Plane-Wreck Site

Bolivia Raids Homes Looking for Millions in Cash Taken From Plane-Wreck Site

March 9, 2026
Terrorists and criminals hideout Salimpur Jungle to be cleaned

Terrorists and criminals hideout Salimpur Jungle to be cleaned

March 9, 2026
Pakistan Army strikes Taliban posts along border

Pakistan Army strikes Taliban posts along border

March 9, 2026
GST Evasion Scheme: Man Uses Stolen IDs to Operate Firms in Thane

GST Evasion Scheme: Man Uses Stolen IDs to Operate Firms in Thane

March 9, 2026
Monday, March 9, 2026
  • About us
  • Advertise with us
  • Submit Articles
  • Privacy Policy
  • Contact us
Asia Today
No Result
View All Result
Subscribe
  • Login
  • Eastern Asia
    • China
    • Japan
    • Mongolia
    • North Korea
    • South Korea
  • South-eastern Asia
    • Brunei
    • Cambodia
    • Indonesia
    • Laos
    • Malaysia
    • Myanmar
    • Philippines
    • Singapore
    • Thailand
    • Timor Leste
    • Vietnam
  • Southern Asia
    • Afghanistan
    • Bangladesh
    • Bhutan
    • India
    • Iran
    • Maldives
    • Nepal
    • Pakistan
    • Sri Lanka
  • Central Asia
    • Kazakhstan
    • Kyrgyzstan
    • Tajikistan
    • Turkmenistan
    • Uzbekistan
  • Western Asia
    • Armenia
    • Azerbaijan
    • Bahrain
    • Cyprus
    • Georgia
    • Iraq
    • Israel
    • Jordan
    • Kuwait
    • Lebanon
    • Oman
    • Qatar
    • Saudi Arabia
    • State of Palestine
    • Syria
    • Turkey
    • United Arab Emirates
    • Yemen
  • More News
    • Opinion
    • Politics
    • Business
    • Entertainment
    • Fashion
    • Food
    • Health
    • Lifestyle
    • Science
    • Tech
    • Sports
  • Eastern Asia
    • China
    • Japan
    • Mongolia
    • North Korea
    • South Korea
  • South-eastern Asia
    • Brunei
    • Cambodia
    • Indonesia
    • Laos
    • Malaysia
    • Myanmar
    • Philippines
    • Singapore
    • Thailand
    • Timor Leste
    • Vietnam
  • Southern Asia
    • Afghanistan
    • Bangladesh
    • Bhutan
    • India
    • Iran
    • Maldives
    • Nepal
    • Pakistan
    • Sri Lanka
  • Central Asia
    • Kazakhstan
    • Kyrgyzstan
    • Tajikistan
    • Turkmenistan
    • Uzbekistan
  • Western Asia
    • Armenia
    • Azerbaijan
    • Bahrain
    • Cyprus
    • Georgia
    • Iraq
    • Israel
    • Jordan
    • Kuwait
    • Lebanon
    • Oman
    • Qatar
    • Saudi Arabia
    • State of Palestine
    • Syria
    • Turkey
    • United Arab Emirates
    • Yemen
  • More News
    • Opinion
    • Politics
    • Business
    • Entertainment
    • Fashion
    • Food
    • Health
    • Lifestyle
    • Science
    • Tech
    • Sports
No Result
View All Result
Morning News
No Result
View All Result
Home Western Asia United Arab Emirates

Screensaver malware revives stealthy access tactic — Arabian Post

by Asia Today Team
February 6, 2026
in United Arab Emirates
Reading Time: 3 mins read
21 1
A A
0
Screensaver malware revives stealthy access tactic — Arabian Post
25
SHARES
309
VIEWS
Share on FacebookShare on Twitter

READ ALSO

1win Arranges Private Charter Flights for VIP Clients Leaving the UAE Amid Aviation Disruptions — Arabian Post

How China builds consensus, boosts development through consultative democracy — Arabian Post


Screensaver malware revives stealthy access tactic — Arabian Post

A coordinated cyber-espionage and crime-linked marketing campaign has surfaced that repurposes an obscure Home windows function to realize long-term management of company methods, based on a number of safety corporations monitoring the exercise. Attackers are distributing Home windows screensaver recordsdata, identifiable by the. scr extension, via rigorously tailor-made phishing emails and utilizing them to put in reliable distant administration software program that blends into enterprise environments.

The operation hinges on social engineering relatively than technical novelty. Victims are prompted to obtain what seems to be a innocent attachment, usually framed as a doc requiring preview or verification. When executed, the screensaver file runs with the identical privileges as a normal executable, permitting the attackers to load Distant Monitoring and Administration instruments generally utilized by IT groups. As a result of these instruments are signed, broadly deployed and designed for persistence, they usually evade signature-based detection and repute checks.

Safety analysts say the abuse of. scr recordsdata marks a deliberate return to a file sort that has largely pale from person consciousness. Screensavers have been as soon as frequent on Home windows methods however are actually hardly ever exchanged by electronic mail, making a blind spot in each person vigilance and automatic filtering. Many electronic mail gateways deprioritise the extension, and a few organisations don’t explicitly block it, assuming it poses little threat in trendy workflows.

As soon as put in, the distant administration software program allows full command execution, file switch, system reconnaissance and lateral motion throughout networks. In a number of documented circumstances, attackers used the entry to reap credentials, deploy follow-on payloads and keep management for weeks with out triggering alarms. The instruments’ built-in options, corresponding to scheduled duties and repair persistence, additional complicate detection and removing.

Researchers word that the marketing campaign doesn’t depend on a single malicious platform however cycles via well-known industrial RMM merchandise to complicate attribution and takedown efforts. Through the use of software program already trusted in enterprise settings, the operators cut back the probability of rapid response from safety groups, who might mistake the exercise for authorised administrative work. Logs usually present the instruments speaking with cloud-hosted infrastructure that mirrors reliable distant help site visitors.

The focusing on seems selective relatively than opportunistic. Phishing lures have been customised with industry-specific language and believable inside references, suggesting prior reconnaissance. Organisations in manufacturing, skilled providers, logistics and regional authorities our bodies have been affected, with a focus on mid-sized corporations that always lack round the clock monitoring however nonetheless maintain worthwhile operational knowledge.

The marketing campaign additionally displays a broader shift in attacker tradecraft in the direction of “dwelling off the land” strategies, the place built-in system options and bonafide software program are used to minimise the malware footprint. By avoiding customized binaries, risk actors decrease the possibility of detection by endpoint safety platforms that target identified malicious behaviour patterns. Screensaver recordsdata match neatly into this strategy as a result of they’re native to the Home windows ecosystem but seldom scrutinised.

Defenders are being urged to reassess long-standing assumptions about file varieties thought-about out of date or low threat. A number of safety advisories advocate blocking or quarantining. scr attachments at electronic mail gateways, imposing software allow-listing, and tightening controls across the set up and use of distant administration instruments. Behavioural monitoring, relatively than reliance on static signatures, can also be being highlighted as essential for recognizing misuse of reliable software program.



Source link

Tags: AccessArabianmalwarePostrevivesScreensaverstealthyTactic

Related Posts

1win Arranges Private Charter Flights for VIP Clients Leaving the UAE Amid Aviation Disruptions — Arabian Post
United Arab Emirates

1win Arranges Private Charter Flights for VIP Clients Leaving the UAE Amid Aviation Disruptions — Arabian Post

March 9, 2026
How China builds consensus, boosts development through consultative democracy — Arabian Post
United Arab Emirates

How China builds consensus, boosts development through consultative democracy — Arabian Post

March 8, 2026
OpenAI unveils Codex Security for automated defence — Arabian Post
United Arab Emirates

OpenAI unveils Codex Security for automated defence — Arabian Post

March 7, 2026
Huawei, Meralco, and SANXING Ningbo Launch Intelligent Distribution Solution and Lighthouse Initiative — Arabian Post
United Arab Emirates

Huawei, Meralco, and SANXING Ningbo Launch Intelligent Distribution Solution and Lighthouse Initiative — Arabian Post

March 7, 2026
Vietnam’s Unified Political System Drives to End IUU Fishing — Arabian Post
United Arab Emirates

Vietnam’s Unified Political System Drives to End IUU Fishing — Arabian Post

March 6, 2026
Geopolitical instability and interconnected risks raise fears of Black Swan scenarios — Arabian Post
United Arab Emirates

Geopolitical instability and interconnected risks raise fears of Black Swan scenarios — Arabian Post

March 5, 2026
Asia Today

Copyright © 2022 Asia Today.

Navigate Site

  • Disclaimer
  • Privacy Policy
  • Cookie Privacy Policy
  • DMCA
  • Terms and Conditions
  • Contact us

Follow Us

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
  • World
  • Eastern Asia
    • China
    • Japan
    • Mongolia
    • North Korea
    • South Korea
  • South-eastern Asia
    • Brunei
    • Cambodia
    • Indonesia
    • Laos
    • Malaysia
    • Myanmar
    • Philippines
    • Singapore
    • Thailand
    • Timor Leste
    • Vietnam
  • Southern Asia
    • Afghanistan
    • Sri Lanka
    • Bangladesh
    • Bhutan
    • India
    • Iran
    • Maldives
    • Nepal
    • Pakistan
    • Central Asia
    • Kazakhstan
    • Kyrgyzstan
    • Tajikistan
    • Turkmenistan
    • Uzbekistan
  • Western Asia
    • Armenia
    • Azerbaijan
    • Bahrain
    • Cyprus
    • Georgia
    • Iraq
    • Israel
    • Jordan
    • Kuwait
    • Lebanon
    • Oman
    • Qatar
    • Saudi Arabia
    • State of Palestine
    • Syria
    • Turkey
    • United Arab Emirates
    • Yemen
  • Opinion
  • Politics
  • Business
  • Entertainment
  • Fashion
  • Food
  • Health
  • Lifestyle
  • Science
  • Tech
  • Travel
  • Sports
  • About us
  • Advertise with us
  • Privacy Policy
  • Contact us
  • Support AsiaToday

Copyright © 2022 Asia Today.