Experts Warn of ‘Highly Sophisticated’ Weaponized JPEG Campaign Used to Deliver ScreenConnect Malware



  • The attackers weaponized a .jpeg file to deliver PowerShell payloads, trojanized ScreenConnect, and establish persistence.
  • The malware enables credential theft, encrypted C2 communications, and surveillance functions.
  • Cyfirma warns that the campaign reflects a mature intrusion framework

Be careful when downloading files from the Internet, as even innocent .jpeg files can contain malware, experts warned.

Security researchers Cyfirma released a detailed report on a new hacking campaign they dubbed “Operation SilentCanvas.” While we don’t know the number of infections or victims successfully compromised, researchers said the campaign likely targets businesses and other organizations that use remote administration tools.

Leave a Comment

Your email address will not be published. Required fields are marked *