Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Critical cPanel Flaws Allow Access to Sensitive System
May 15, 2026
Home/Threats/DesckVB RAT: Multi-stage Infection & Chain Plugin-Based
Threats

DesckVB RAT: Multi-stage Infection & Chain Plugin-Based

DesckVB RAT version 2.9, a sophisticated new modular Remote Access Trojan, has recently surfaced. Built on the .NET framework, this threat has been observed in active malware campaigns throughout...

Marcus Rodriguez
Marcus Rodriguez
February 5, 2026 2 Min Read
5 0

DesckVB RAT version 2.9, a sophisticated new modular Remote Access Trojan, has recently surfaced. Built on the .NET framework, this threat has been observed in active malware campaigns throughout early 2026.

Unlike simple backdoors, this threat demonstrates a high level of operational maturity, designed to establish persistent control over compromised systems while evading traditional defense mechanisms.

The malware initiates its attack through a highly obfuscated Windows Script Host (WSH) JavaScript file.

This initial stager performs critical setup tasks, such as copying itself to public user directories and executing via the wscript engine to mask its activity.

By leveraging native Windows components, the attackers can blend their malicious traffic with legitimate system processes, complicating detection efforts for security teams.

GitHub analysts noted that this initial activity is merely a gateway, setting the stage for a more potent payload.

Following the initial execution, the infection chain transitions into a PowerShell stage that performs rigorous anti-analysis checks.

It verifies internet connectivity and scans for debugging tools, ensuring the environment is safe before downloading the core malicious components. This careful validation prevents the malware from executing in sandboxes.

The impact of DesckVB RAT lies in its stability and stealth. By using a fileless .NET loader, the malware executes directly in memory without leaving a physical footprint on the disk.

This “living off the land” approach allows it to bypass many static file scanning defenses, making forensic analysis significantly more challenging for incident responders.

Modular Plugin Ecosystem

The most defining feature of DesckVB RAT is its robust plugin-based architecture, which allows operators to extend capabilities dynamically.

Instead of bundling every malicious function into a single executable, the attackers can selectively deploy specific modules post-compromise based on the target’s value.

Validated plugins include a comprehensive keylogger that tracks active windows, a webcam streamer using DirectShow, and an antivirus enumerator that reports installed security products.

These modules are delivered via a custom TCP protocol that uses distinct delimiters to manage payloads.

This flexibility transforms the RAT from a simple backdoor into a versatile espionage tool, capable of adapting to various operational needs without requiring a complete re-infection of the host system.

Security professionals are advised to focus on behavioral detection to mitigate this threat.

Monitoring for unusual wscript.exe execution and PowerShell scripts building decimal byte arrays can provide early warning signs.

Ensuring that endpoint detection systems are tuned to spot reflective code loading is also essential for effective mitigation against these evolving attacks.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

New 3 Step Malvertising Chain Abusing Facebook Paid Ads to Push

Next Post

Hackers Redirect NGINX Traffic to Mal Threat Actors

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
TeamPCP Hackers Steal Cloud & Developer Credentials via
May 15, 2026
Microsoft Exposes Kazuar Malware’s Modular P Details Malware’s
May 15, 2026
VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us