New Stego Campaign Hides AsyncRAT in Images via MS Office Exploit

A stealthy new cyberattack campaign is using steganography and a legacy Microsoft Office vulnerability to deliver AsyncRAT — a powerful remote access trojan capable of full system compromise.
This multi-stage campaign cleverly embeds malicious code in innocent-looking image files, using advanced evasion tactics to bypass traditional security solutions.
- Attackers are exploiting the CVE-2017-0199 vulnerability in Microsoft Office to launch the infection chain via phishing emails.
- Victims who open the malicious Office documents unknowingly trigger a remote HTA script, which downloads a trojanized Prnport.vbs Windows script.
- This script runs a heavily obfuscated PowerShell command that downloads an image file containing hidden malicious code.
- The malware uses steganography to embed a malicious DLL inside the image, invisible to standard file scans.
- The PowerShell script identifies Base64-encoded segments inside the image and extracts a DLL named Microsoft.Win32.TaskScheduler.
- The injected DLL performs process hollowing, replacing the memory of a legitimate MSBuild.exe process with the AsyncRAT payload.
- AsyncRAT establishes contact with C2 server at 148.113.214.176:7878, granting attackers full remote access to the infected device.
- Attack capabilities include keylogging, remote desktop, surveillance, and secondary payload delivery, including ransomware.
This campaign demonstrates how threat actors are combining old exploits with new evasion strategies like steganography to stay ahead of detection systems. Organizations must prioritize patch management, disable legacy scripting features, and inspect image files for suspicious activity. At Net Protector Cyber Security, we continuously update our defense mechanisms to detect even the most deceptive malware hiding in plain sight.
- Other (42)
- Ransomware (142)
- Events and News (27)
- Features (45)
- Security (466)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (44)
- Malware Alerts (212)
- Cyber Attack (260)
- Data Backup (11)
- Data Breach (98)
- Phishing (156)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (69)
- Android Security (71)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (56)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (5)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (11)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (10)
- Impersonation phishing (1)
- DDoS (5)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)