Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Attackers Use Windows Screensavers to Drop Malware, RMM Tools
    Cybersecurity

    Attackers Use Windows Screensavers to Drop Malware, RMM Tools

    adminBy adminFebruary 5, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Attackers Use Windows Screensavers to Drop Malware, RMM Tools
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In a novel approach to spear phishing, threat actors are using Windows screensaver files (.scr) to get past defender lines and compromise organizations. 

    ReliaQuest Threat Research published research today detailing how attackers lured multiple users into running a Windows screensaver file, which installs a remote monitoring and management (RMM) tool, giving the attacker interactive remote control over the target’s operating system. 

    Exploiting unusual file types isn’t unheard of; APTs and the like have long exploited Windows shortcut files to execute malicious code, for example. The screensaver attack is a novel twist on this kind of thing. It’s a file type many people don’t think about in their day-to-day lives but, as ReliaQuest’s Andrew Adams points out in the research blog post, “they’re executables that don’t always receive executable-level controls.”

    “The risk persists because of a gap between perception and reality. In Windows, .scr files are portable executable (PE) programs that can run arbitrary code. This means that .scr files, which many users may not realize are executable, can be exploited by attackers to execute malicious code,” Adams wrote. “Without proper restrictions in application control policies or user awareness, these files pose a significant security risk, potentially leading to unauthorized access, data breaches, or malware infections.”

    Related:Google Looker Bugs Allow Cross-Tenant RCE, Data Exfil

    How Threat Actors Exploit Screensaver Files

    The initial access observed is a business-themed phishing lure, such as an email request to view an invoice or project summary. The target is linked to an “.scr” file hosted on a cloud storage platform hosted outside the recipient’s organization. The user is expected to download and execute the file, which has a higher likelihood of bypassing security tools due to the unusual file type. 

    The file installs an otherwise legitimate RMM tool, JWrapper, and the file enables the attacker to connect to it. The threat actor connects to attacker infrastructure and uses the RMM tool for “persistent, interactive access that allows attackers to maintain a foothold within the environment and quietly prepare for further malicious actions.” Follow-on activity could consist of data theft, lateral movement, and ransomware deployment against a compromised organization. 

    “This campaign is a reminder that trusted services and legitimate tools can still be the delivery path. For attackers, it’s efficient, lowers the technical barrier, and reduces reliance on attacker-owned infrastructure, making infiltration, evasion, and long-term access easier,” Andrews wrote. “It’s also highly reusable. Swap the cloud service, change the lure, rotate the remote-access tool, but the workflow stays the same, which makes this technique both scalable and adaptable.”

    Related:GlassWorm Malware Returns to Shatter Developer Ecosystems

    ReliaQuest said that although it’s not sure exactly who the threat actor is behind the campaign yet, the attack has been observed across multiple customers. 

    “Unfortunately, there is no attribution at this time,” a ReliaQuest spokesperson tells Dark Reading. “The threat actors are abusing consumer cloud storage, which does not allow us to see where the source of the activity is coming from. Due to the outbound IPs having no consistent [autonomous system number, or ASN] or infrastructure, there is currently no way to attribute this activity to a threat actor. This suggests that the threat actors are opportunistic compared to a cluster.”

    Save Yourself from Malicious Screensavers

    This activity is not a one-and-done. The blog post pointed out that in August 2025, attackers were spotted using Windows screensaver files to deploy the remote access Trojan (RAT) “GodRAT” against financial institutions. It happened before, it’s happening now, and it will almost certainly happen again.

    Related:Chinese Hackers Hijack Notepad++ Updates for 6 Months

    To combat this, ReliaQuest recommends a three-pronged action plan for organizations. First and foremost, treat .scr files as the executables they are. Application control solutions (like Windows Defender) can enable execution from trusted, signed, and/or approved sources.

    Second, maintain an approved RMM allowlist and alert on unapproved RMM agent installations. 

    Third, reduce risk from third-party file hosting sites by blocking “non-business file-hosting services at the DNS or web proxy layer.”

    attackers Drop Malware RMM Screensavers tools Windows
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThe New Era of Search
    Next Article Amazon’s Alexa+ AI chatbot is now available to everyone in the US, with a catch
    admin
    • Website

    Related Posts

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google TV Home (Android TV) 1.0.900391771 APK Download by Google LLC

    April 19, 2026

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,400)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,676)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google TV Home (Android TV) 1.0.900391771 APK Download by Google LLC

    April 19, 2026

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026
    Most Popular
    • Google TV Home (Android TV) 1.0.900391771 APK Download by Google LLC
    • The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now
    • Apple AirTag tracking can be misled by replayed Bluetooth signals
    • NIST to stop rating non-priority flaws due to volume increase
    • Home Assistant’s intimidating reputation is completely undeserved once you survive the first week
    • The Complete Guide To Agentic Commerce
    • I’ve used Samsung Browser for years, but this is why I won’t go back to Chrome
    • This $10 accessory has completely transformed my Pixel 10
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.