Threat Actors Market Stealthy New RAT as Alternative to ScreenConnect FUD

Cybersecurity researchers have recently uncovered a troubling trend in the underground cybercrime marketplace: a sophisticated Remote Access Trojan (RAT) that is being promoted as a fully undetectable (FUD) alternative to the legitimate ScreenConnect remote access solution. This new threat marks a notable escalation in the professionalization of malware-as-a-service operations, with malicious actors specifically aiming to exploit the trust associated with established remote administration tools.

The primary allure of this malware lies in its ability to completely evade security warnings from critical defenses such as Google Chrome and Windows SmartScreen. These security barriers are designed to protect users from malicious downloads, and the malware’s evasion tactics are particularly alarming.

According to advertisements on underground forums, the malware achieves this evasion by bundling itself with valid Extended Validation (EV) certificates—high-assurance digital certificates that browsers typically display with enhanced visual trust indicators. This clever tactic allows the malware to masquerade as a legitimate application, significantly lowering the chances of detection.

Moreover, the threat actors have crafted a comprehensive evasion toolkit that includes antibot mechanisms and cloaked landing pages. These advanced features enable the malware to present benign content to automated security scanners and sandbox environments while simultaneously delivering malicious payloads to unsuspecting users.

Common fileless attack methods employed by this malware include leveraging PowerShell, phishing emails, malicious links, and seemingly legitimate websites to deliver malware without traditional files. This delivery mechanism showcases a high level of social engineering sophistication, as attackers create convincing fake Adobe Acrobat Reader download pages. By exploiting users’ familiarity with legitimate software updates, they facilitate initial compromises, demonstrating a continued trend of using trusted brands for malicious purposes.

ScreenConnect FUD

Technical analysis reveals that the RAT utilizes fileless execution techniques, primarily relying on PowerShell-based commands to load its executable payload directly into memory. This method allows the malware to operate without writing persistent files to disk, significantly reducing its detectability by traditional antivirus solutions that depend on file-based scanning mechanisms.

The remote access capabilities of this malware include a comprehensive remote viewer function, granting attackers real-time visual control over compromised systems. This functionality enables continuous monitoring, interactive data exfiltration, and dynamic system manipulation without the need for additional tool deployment.

The threat actor’s sales strategy illustrates a highly organized cybercrime-as-a-service model. Advertisements explicitly position the tool as a “FUD loader,” indicating its intended use as a primary infection vector for establishing persistent system access before deploying secondary payloads such as ransomware, banking trojans, or espionage tools. The seller’s promise of demo availability and 24-hour delivery timelines suggests a mature operational infrastructure designed to support scalable malware distribution, mirroring legitimate software sales models and highlighting the increasing sophistication of cybercriminal enterprises.

Growing Threat Landscape

This development reflects broader trends in the cyberthreat landscape, where attackers are increasingly focused on exploiting user trust in legitimate brands and circumventing modern security technologies. The specific targeting of ScreenConnect’s reputation indicates that threat actors are systematically identifying and exploiting trust relationships between users and established remote access solutions.

The integration of valid EV certificates with malicious payloads represents a particularly concerning evolution, as it directly undermines one of the internet’s fundamental trust mechanisms. This technique could potentially scale across multiple attack campaigns, making detection significantly more challenging for both automated systems and end users.

Security professionals should brace for an uptick in instances of legitimate brand impersonation and enhanced evasion techniques as threat actors continue to refine their operations. Organizations utilizing remote access tools are advised to implement additional verification procedures and maintain heightened awareness of social engineering attempts targeting their trusted software relationships.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Tech Optimizer
Threat Actors Market Stealthy New RAT as Alternative to ScreenConnect FUD