When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Remcos returns
For its part, Remcos was not always consideredmalware.
It was built as a legitimate, commercial software, used for remote administration tasks.
Image Credit: Shutterstock
Remcos can log keystrokes, capture screenshots, and execute commands on infected systems.
“In other words, it is a fileless variant of Remcos.”
It is cheap to execute, and performs well, making it a highly efficient attack vector.