Experts warn of ‘highly sophisticated’ weapon-based JPEG campaign used to deploy ScreenConnect malware


  • Attackers weaponized a .jpeg file to deliver PowerShell payload, trojanize ScreenConnect and establish persistence
  • The malware enables credential theft, encrypted C2 communications, and surveillance capabilities
  • Cyfirma warns that the campaign reflects a mature intrusion framework

Be careful when downloading files from the Internet, as even innocent .jpeg files can actually contain malware, experts have warned.

Security researchers Cyfirma published an in-depth report on a brand new hacking campaign they called “Operation SilentCanvas”. While we don’t know the number of infections or successful compromised victims, the researchers said the campaign likely targets companies and other organizations that use remote administration tools.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top