Skip to main content
Skip to main content
7 entries found.
Updated on Mar 17, 2018
Alert level: severe
Updated on Nov 25, 2023
Alert level: severe
Updated on Jul 05, 2018

Remcos is used to take control of an infected system and collect system information like keystrokes, webcam images, screen captures, and passwords. 

Remcos supports many control commands to perform various tasks on a victim’s device.

Based on command-and-control (C2) commands, it can do further malicious activities such as start and stop keyloggers, download file, delete file, upload file, open and close camera, record audio, display warning message, and get clipboard data.

Read the following blogs for more information:

Alert level: severe
Updated on Nov 15, 2019

Remcos is used to take control of an infected system and collect system information like keystrokes, webcam images, screen captures, and passwords. 

Remcos supports many control commands to perform various tasks on a victim’s device.

Based on command-and-control (C2) commands, it can do further malicious activities such as start and stop keyloggers, download file, delete file, upload file, open and close camera, record audio, display warning message, and get clipboard data.

Read the following blogs for more information:

Alert level: severe
Updated on Aug 03, 2018

Remcos is used to take control of an infected system and collect system information like keystrokes, webcam images, screen captures, and passwords. 

Remcos supports many control commands to perform various tasks on a victim’s device.

Based on command-and-control (C2) commands, it can do further malicious activities such as start and stop keyloggers, download file, delete file, upload file, open and close camera, record audio, display warning message, and get clipboard data.

Read the following blogs for more information:

Alert level: severe
Updated on Apr 24, 2019

This is a detection for an RTF file with an equation object. It takes advantage of the Microsoft Office vulnerability CVE-2017-11882. It also downloads a Remcos payload.

Read the following blogs for more information:

Alert level: severe
Updated on Feb 05, 2019

Remcos is used to take control of an infected system and collect system information like keystrokes, webcam images, screen captures, and passwords. 

Remcos supports many control commands to perform various tasks on a victim’s device.

Based on command-and-control (C2) commands, it can do further malicious activities such as start and stop keyloggers, download file, delete file, upload file, open and close camera, record audio, display warning message, and get clipboard data.

Read the following blogs for more information:

Alert level: severe