SHARE
Facebook X Pinterest WhatsApp

LevelBlue Report: Attackers Using AsyncRAT To Steal Credentials

Hackers use AsyncRAT via fileless loaders in trojanized ScreenConnect installs to steal credentials, log keys, and hijack crypto wallets.

Written By
thumbnail Luis Millares
Luis Millares
Sep 12, 2025
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

LevelBlue Labs has uncovered a campaign in which hackers are deploying AsyncRAT, a Remote Access Trojan (RAT), through a fileless loader that masquerades as a legitimate tool. The malware is designed to steal user credentials, enable keylogging, and siphon cryptocurrency wallet data.

Weaponizing trusted utilities to evade detection

The RAT was highlighted in LevelBlue Labs’ latest Threat Spotlight. Unlike traditional malware that writes payloads to disk, the security provider noted that fileless threats, such as AsyncRAT, operate in memory, making them harder to detect and remediate. 

The campaign’s initial entry point was a compromised ScreenConnect installer. ScreenConnect is a remote support and access platform that lets IT teams and MSPs connect to end-user devices for remote troubleshooting, maintenance, and IT support.

Here’s how the attack works:

  • Attackers gained initial access through a trojanized ScreenConnect installer, then executed a layered VBScript and PowerShell loader to fetch obfuscated payloads.
  • Persistence was maintained via a fake “Skype Updater” scheduled task, ensuring re-execution at every login.
  • AsyncRAT modules enabled credential theft, keylogging, clipboard hijacking, and wallet reconnaissance while evading detection through AMSI and ETW bypass techniques.

LevelBlue’s researchers warned that malicious actors are increasingly weaponizing trusted tools, such as PowerShell and WScript, to execute undetected attacks and steal sensitive information.

In conclusion, the report emphasized the importance of sharing threat intelligence to keep pace with evolving tactics and malware.

“Sharing these behaviors and techniques with internal teams allows for proactive threat

hunting, enabling defenders to recognize patterns, anticipate attacker evolution, and improve investigative focus — all of which ultimately advance both detection and response capabilities,” the report said.

Proactively managing risks: what organizations need to do to stay secure

In parallel with hackers weaponizing trusted tools in attack campaigns, LevelBlue’s recently released Data Accelerator: Software Supply Chain and Cybersecurity report highlighted a broader trend of inadequate visibility among organizations in managing third-party threats.

The report highlighted the vulnerability of companies to supply chain attacks, with nearly half of surveyed organizations (49%) acknowledging that they lack the necessary visibility to accurately detect and manage risks within their ecosystems.

In response, Theresa Lanowitz, chief evangelist at LevelBlue, advised organizations to apply “security-focused KPIs” to every leader, regardless of their function.

“There has to be some responsibility internally around managing risk, and if everybody has to think about security within their goals, then they’ll naturally start to consider how they interact with third-party tools and what that means for the overall security of the organization,” Lanowitz told Channel Insider in July.

In July, LevelBlue entered a strategic partnership with UK-based channel development firm Kompigo. Read our coverage of the agreement and how it helps expand security services for MSPs and MSSPs within the region.

thumbnail Luis Millares

Luis Millares has extensive experience reviewing virtual private networks (VPNs), password managers, and other security software. He has tested and reviewed numerous forms of tech, covering consumer technology like smartphones and laptops, all the way to enterprise software and cybersecurity products. He has authored over 450 online articles on technology and has worked for the leading tech journalism site in the Philippines, YugaTech.com. He currently contributes to the Daily Tech Insider newsletter, providing well-researched insights and coverage of the latest in technology.

Recommended for you...

Report: Security Teams are Drowning in Alerts, Turning to AI
Jordan Smith
Sep 12, 2025
Cyware to Join Microsoft Intelligent Security Association
Jordan Smith
Sep 11, 2025
Silverfort Research Shows Gaps, Opps in Identity Security
Jordan Smith
Sep 11, 2025
Cynomi Adds Third-Party Risk Management Module to vCISO Platform
Luis Millares
Sep 10, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.