Experts warn of ‘highly sophisticated’ weaponized JPEG campaign used to deliver ScreenConnect malware


  • The attackers used a .jpeg file to deliver PowerShell payloads, used a ScreenConnect Trojan, and established persistence.
  • The malware enables credential theft, encrypted C2 communications, and monitoring features.
  • Cyfirma Warns Campaign Reflects Mature Intrusion Framework

Be careful when downloading files from the internet, as even innocent .jpeg files can contain malware, experts have warned.

Security researchers Cyfirma have released a detailed report on a brand new hacking campaign they’ve dubbed “Operation SilentCanvas.” Although we don’t know the number of infections or the number of compromised victims, researchers said the campaign likely targets businesses and other organizations using remote administration tools.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top