AsyncRAT exploits ConnectWise in a recent malware campaign that highlights how attackers weaponize legitimate remote access tools. Security researchers uncovered a layered attack chain that delivered the trojan through fileless techniques, persistence tricks, and data theft. The operation reveals the growing sophistication of remote access trojans and the increasing risks for businesses relying on widely used IT management software.
How Attackers Exploited ConnectWise
The attack began with unauthorized access through a ConnectWise ScreenConnect deployment. Once inside, attackers launched a Visual Basic Script, which triggered a PowerShell loader. This script downloaded additional payloads, including a DLL and configuration data. The components worked together to execute AsyncRAT while avoiding traditional detection methods.
Persistence and Evasion Tactics
The DLL created a disguised scheduled task named “Skype Updater.” This ensured that the malware survived system reboots. By operating mostly in memory and abusing legitimate system utilities, the attack maintained a low profile. Fileless approaches like these make traditional antivirus solutions far less effective.
Capabilities of AsyncRAT
AsyncRAT gives attackers full control over compromised systems. Its functions include:
- Keylogging to record user input.
- Credential theft from browsers such as Chrome, Brave, Edge, Opera, and Firefox.
- System fingerprinting to gather device and network information.
- Crypto wallet theft from both standalone apps and browser extensions.
- Stolen data is sent to command-and-control servers hosted on dynamic DNS domains. The malware can also retrieve configuration data from paste services to adapt its operations.
Why This Campaign Matters
This campaign demonstrates how cybercriminals combine trusted tools, scripting languages, and stealth tactics. By abusing ConnectWise, attackers can bypass many defensive measures. Businesses face risks ranging from credential loss to direct financial theft, especially when cryptocurrency wallets are targeted.
Defense Recommendations
Organizations should strengthen monitoring around remote access tools and PowerShell activity. Security teams should:
- Audit ConnectWise deployments and apply strict access controls.
- Monitor for suspicious scheduled tasks like “Skype Updater.”
- Enable detailed PowerShell logging for anomaly detection.
- Track outbound traffic to dynamic DNS services.
- Deploy advanced endpoint detection capable of catching fileless malware.
Final Thoughts
AsyncRAT exploits ConnectWise to deliver a stealthy and damaging malware campaign. By blending fileless techniques with persistence tricks, attackers achieve long-term access and theft. Businesses must harden remote access platforms, strengthen monitoring, and deploy modern security solutions to defend against these evolving threats.