Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Flaws in Popular IDE Extensions Allow Data Exfiltration

February 20, 2026

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

February 20, 2026

Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA

February 20, 2026
Facebook X (Twitter) Instagram
Friday, February 20
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Remcos RAT Expands Real-Time Surveillance Capabilities
News

Remcos RAT Expands Real-Time Surveillance Capabilities

Team-CWDBy Team-CWDFebruary 19, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly observed variant of Remcos RAT has introduced real-time surveillance features and stronger evasion techniques, marking a shift in how the malware operates on compromised Windows systems.

The updated strain no longer relies primarily on storing stolen data locally. Instead, it establishes direct online communication with attacker-controlled servers, enabling immediate monitoring and data theft.

The latest build can stream webcam footage in real time and transmit captured keystrokes instantly, reducing forensic traces left on infected machines.

Researchers from Point Wild’s Lat61 Threat Intelligence team detailed the changes, noting that the malware decrypts its configuration only at runtime and dynamically loads critical Windows APIs to avoid detection.

Real-Time Espionage and Modular Design

Remcos, originally a legitimate remote management tool, has long been abused as a Remote Access Trojan (RAT). It provides attackers with full control over infected systems, including file access, credential theft and surveillance capabilities. The newest variant expands these functions through encrypted C2 channels and modular plugins delivered as Dynamic Link Libraries.

Read more on remote access trojans: Android RAT Uses Hugging Face to Host Malware

The malware’s updated capabilities include:

  • Live webcam streaming through a downloaded DLL module

  • Online keylogging that transmits captured input directly to C2 servers

  • Encrypted C2 configuration decrypted only in memory

  • Dynamic API resolution to hinder static analysis

  • Cleanup routines that remove logs, browser data and persistence keys

Point Wild clarified that, rather than embedding webcam functionality in its main executable, Remcos now retrieves the module from its C2 server when instructed. It then loads the library at runtime using Windows API calls, executes recording functions and transmits captured footage in encrypted chunks.

Stealth, Persistence and Cleanup

The malware also checks system privileges before executing certain actions. Elevated rights allow it to modify registry keys, install persistence mechanisms and disable security services. A named mutex, Rmc-GSEGIF, ensures only one active instance runs at a time.

To further complicate analysis, Remcos encrypts its C2 address inside the binary. During execution, it reconstructs the string in memory and immediately uses it for network communication over HTTP or TCP.

After completing data exfiltration, the malware initiates a cleanup process. It deletes keylogging files, screenshots and audio recordings, clears browser cookies and removes registry entries tied to persistence. Finally, it generates a temporary Visual Basic (VB) script in the %TEMP% directory to delete its own files before terminating.

“The latest Remcos variants demonstrate a continued evolution in both stealth and functionality,” Point Wild wrote. “Overall, the persistence of Remcos and the steady refinement of its techniques highlight its ongoing effectiveness as a remote access trojan.”

Security teams are advised to monitor for suspicious outbound connections and unauthorized registry modifications to mitigate potential infections.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleExposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
Next Article Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
Team-CWD
  • Website

Related Posts

News

Flaws in Popular IDE Extensions Allow Data Exfiltration

February 20, 2026
News

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

February 20, 2026
News

Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA

February 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

What’s at stake if your employees post too much online

December 1, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.