When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Remcos returns

For its part, Remcos was not always consideredmalware.

It was built as a legitimate, commercial software, used for remote administration tasks.

Fraude en ligne phishing

Image Credit: Shutterstock

Remcos can log keystrokes, capture screenshots, and execute commands on infected systems.

“In other words, it is a fileless variant of Remcos.”

It is cheap to execute, and performs well, making it a highly efficient attack vector.

You might also like