Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hugging Face Repo with 200k Downloads Inst Trending Repository
May 11, 2026
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Hackers Deploy Trojanized ScreenConnect via Malicious JPEG
May 11, 2026
Home/Threats/Hackers Deploy Trojanized ScreenConnect via Malicious JPEG
Threats

Hackers Deploy Trojanized ScreenConnect via Malicious JPEG

A sophisticated new cyberattack campaign, dubbed Operation SilentCanvas, is actively targeting Windows systems. The operation employs a deceptive tactic: it tricks victims into executing a malicious...

Jennifer sherman
Jennifer sherman
May 11, 2026 4 Min Read
2 0

A sophisticated new cyberattack campaign, dubbed Operation SilentCanvas, is actively targeting Windows systems. The operation employs a deceptive tactic: it tricks victims into executing a malicious PowerShell script disguised as a harmless JPEG image file. Once deployed, this covert script installs dangerous malware, granting attackers full and silent control over the compromised machine. Security researchers have released a detailed report outlining this threat.

The attack begins when a victim receives what appears to be a routine image file called sysupdate.jpeg through a phishing email, a fake software update prompt, or a deceptive file-sharing link.

Despite carrying a .jpeg extension, the file contains no actual image data. Instead, it holds a PowerShell script engineered to quietly set up a staging environment and pull down additional malicious components from attacker-controlled servers.

Researchers at Cyfirma identified and analyzed the full attack chain, revealing just how deep the intrusion goes once the file is opened. The campaign does not rely on a single trick but chains together multiple advanced techniques to avoid detection and maintain a firm foothold inside targeted environments.

Once the initial file runs, the malware downloads a trojanized version of ConnectWise ScreenConnect, a legitimate remote access tool widely used across enterprise networks. The altered version gives attackers a persistent hidden back door while appearing to blend in with trusted software already present on the system.

The threat also gains elevated privileges without triggering any visible security warning. It does this through a fileless technique that manipulates a Windows registry path and abuses a trusted Windows binary to silently bypass the standard User Account Control prompt.

How the Weaponized JPEG Deploys the Malware

The sysupdate.jpeg file lacks the standard image header that all real JPEG files carry. When a victim opens it, Windows does not flag it as a script because the extension mimics an image.

The embedded PowerShell code creates a hidden folder at C:Systems and downloads a trojanized ScreenConnect package from legitserver.theworkpc[.]com over TCP port 5443.

To avoid antivirus detection, the malware reconstructs dangerous command strings at runtime rather than writing them plainly in the file. It also downloads a secondary payload named access.jpeg and runs it directly in memory, so no suspicious executable touches the disk.

Microsoft’s own .NET compiler, csc.exe, then builds a custom launcher named uds.exe directly on the victim machine, giving each compiled binary a unique fingerprint that defeats signature-based scanning.

Multi-Stage Infection Chain Overview (Source - Cyfirma)
Multi-Stage Infection Chain Overview (Source – Cyfirma)

The multi-Stage infection chain shows the end-to-end attack workflow beginning with social engineering and weaponized JPEG delivery, followed by PowerShell payload execution, AMSI bypass, and trojanized ScreenConnect deployment.

After the launcher runs, the malware hijacks a registry key tied to the ms-settings protocol and redirects it toward uds.exe. It then triggers ComputerDefaults.exe, a trusted Windows binary that auto-elevates, causing the payload to run with full administrator rights and no visible prompt. The registry key enabling this bypass is deleted within two seconds, destroying evidence before any investigator can find it.

Post-Compromise Capabilities and Persistence

Once the trojanized ScreenConnect framework is active, the attacker gains remarkable control over the infected machine. The modified software supports real-time screen monitoring, video recording, microphone capture, clipboard interception, keystroke logging, and silent file transfers through an encrypted channel designed to block network inspection.

Hex-level static analysis of the weaponized sysupdate.jpeg payload (Source - Cyfirma)
Hex-level static analysis of the weaponized sysupdate.jpeg payload (Source – Cyfirma)

The hex-level static analysis of the weaponized sysupdate.jpeg payload shows the embedded PowerShell staging logic and malicious infrastructure references.

The malware creates a hidden desktop environment operating out of the logged-in user’s view, allowing the attacker to run tools without detection. A persistent Windows service named OneDriveServers keeps the malware alive across reboots.

A separate component intercepts usernames and passwords at the Windows login screen before they reach the authentication system, and hidden local administrator accounts can be created for long-term access.

Security teams are advised to block or closely monitor execution of commonly abused Windows binaries including csc.exe, cvtres.exe, and ComputerDefaults.exe. Organizations should enforce strict controls over remote access platforms, deploy detection rules for suspicious PowerShell behavior, and isolate any system showing unexpected ScreenConnect activity. Credential resets for all privileged accounts are strongly recommended following any suspected exposure.

Indicators of Compromise (IoCs):-

Type Indicator Description
IP Address 45[.]138[.]16[.]64 Attacker-controlled C2 backend IP address — Block
Domain legitserver[.]theworkpc[.]com Attacker-controlled C2 domain used for payload delivery and remote sessions — Block
SHA256 7adffc1c0b3fdcba46e8d0a81203c955976d4ef39893c98d0b2dbfbb8d6a8ec3 Malicious payload hash — Block
SHA256 ecd5ed16975d556d1d17bc980f248f8a5262bed11df9d9cf999efd9c273c11df Malicious payload hash — Block
SHA256 cea1d85967d2c456fccecae3a70ff2adfe4c113aacf9d18c35 Malicious payload hash — Block
SHA256 906c2ed24ca9b46e4c9f3bb4a65c640795bfc1a56c0b56485b849ccd97027eed7ad9aa78a732a4f Malicious payload hash — Block
SHA256 ee3d776cdaf82335e4293e19ee313cc35eee49cde9963b96766a8f9c89d44a79 Malicious payload hash — Block
SHA256 4d8ac85c5b98c69ba44146df61183e9bf613edd796aa516c3ae73611b7d77c06 Malicious payload hash — Block
MD5 7DD05336097E5A833F03A63D3221494F uds.exe compiled dropper hash — Block
SHA256 A635F0C94C98B658AE799978994F0D0A292567CD97B8A19068A8423D1297652A uds.exe compiled dropper hash — Block
File Name sysupdate.jpeg Weaponized PowerShell loader disguised as JPEG
File Name access.jpeg Secondary obfuscated in-memory payload
File Name uds.exe On-host compiled malicious launcher binary
File Path C:Systems Attacker staging directory created on victim machine
File Path C:ProgramDataOneDriveServer Trojanized ScreenConnect deployment directory

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwarephishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

macOS Malware Spread via Google Ads & Claude.ai Leverages Legitimate

Next Post

GhostLock Attack Locks Files Via Windows Sharing Like Ransom

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Vidar Malware Steals Browser Credentials, Wallets &
May 11, 2026
JDownloader Hacked to Infect Users with New Python RAT
May 11, 2026
Top 10 Best Interactive Malware Analysis Tools for
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us