Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0332

Remcos

Type

Remote Access Trojan (RAT)

Associated threat actors

Various

Key Capabilities

Remote access and control, enabling keystroke recording, screen capturing, audio and video recording, and credential theft.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is Remcos?

Remcos (S0332) is a commercial Remote Access Trojan (RAT) used by cybercriminals for data theft and system control. Often delivered via phishing, it gives an attacker full, covert control over a victim’s computer.

Once installed, Remcos connects to a command-and-control (C2) server, allowing the attacker to record keystrokes, steal credentials, and download additional malware. It effectively turns the infected machine into part of a botnet.

How to Defend Against Remcos?

Defending against Remcos requires a focus on preventing its initial delivery and detecting its C2 communications.

  • Be vigilant when opening email attachments, as phishing is the primary delivery vector for this RAT.
  • Keep all operating systems and software patched to limit the vulnerabilities that can be exploited for initial access.
  • Deploy endpoint detection and antivirus to identify and block the execution of known RATs and their associated behaviors.
  • Use network detection (NDR) with integrated threat intelligence to spot and block Remcos’s C2 server communications.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.