
New Fileless Remcos Attacks Bypassing EDRs Malicious Code into RMClient
Organizations face an escalating threat landscape. A new and particularly insidious wave of fileless Remcos attacks is actively bypassing Endpoint Detection and Response (EDR) solutions, injecting malicious code directly into the legitimate RMClient application. This represents a significant shift in attacker tactics, demanding immediate attention from cybersecurity professionals.
The Evolution of Remcos: From RAT to Potent Fileless Infostealer
Remcos, initially marketed as legitimate remote surveillance software, has become a formidable weapon in the arsenal of threat actors. During the third quarter of 2025, it shockingly emerged as the leading infostealer in detected malware campaigns, accounting for approximately 11% of all cases. This is a crucial indicator of its growing prevalence and effectiveness. Traditionally, malware like Remcos relies on file-based deployment, leaving forensic artifacts for EDRs to detect. The current evolution, however, sidesteps these traditional methods.
Understanding Fileless Remcos Attacks: Bypassing EDRs
The core of this new attack vector lies in its fileless nature. Instead of dropping executables onto the disk, which EDRs are designed to scrutinize, threat actors are now injecting malicious code directly into live processes. Specifically, these new attacks leverage the legitimate RMClient, the client-side component of the Remcos tool itself. This technique makes detection significantly more challenging because the malicious activity appears to originate from a trusted application already present on the system. EDRs, which often rely on signature-based detection or file integrity monitoring, struggle to identify these in-memory injections, as no new malicious file is ever written to disk.
This method significantly reduces the attack’s footprint and increases its stealth. By operating within the memory space of a legitimate application, the malware blends in with normal system activity, making it difficult for EDRs to differentiate benign processes from malicious ones without advanced behavioral analysis.
Impact and Consequences
The success of these fileless Remcos attacks carries severe consequences. As an infostealer, Remcos is designed to exfiltrate sensitive data, including login credentials, financial information, and proprietary company data. The remote access capabilities also allow attackers to gain full control over compromised systems, enabling further lateral movement within a network, deployment of additional malware, or the execution of destructive actions. The ability to bypass EDRs, often considered a last line of defense, means that organizations may be compromised for extended periods without immediate detection, leading to greater data loss and operational disruption.
Remediation Actions and Enhanced Defenses
Combating these advanced fileless threats requires a multi-layered and proactive defense strategy. Relying solely on traditional EDRs is no longer sufficient. Organizations must adopt enhanced security postures.
- Advanced Behavioral EDR/XDR Solutions: Prioritize EDR/XDR platforms that offer robust behavioral analysis capabilities. These solutions can detect anomalous process injection, unusual memory activities, and deviations from normal application behavior, regardless of whether a file is involved.
- Application Whitelisting: Implement strict application whitelisting policies to prevent unauthorized executables and scripts from running. While fileless attacks operate in memory, whitelisting can limit the initial execution vectors that lead to the compromise.
- Memory Forensics and Monitoring: Employ tools capable of deep memory analysis to identify suspicious injections and code modifications within running processes. Regularly scan memory for known malware patterns and anomalies.
- Endpoint Privilege Management: Enforce the principle of least privilege for all user accounts and applications. Limiting the privileges of the RMClient application and other common potential targets can restrict the damage an attacker can inflict even if an injection occurs.
- Network Segmentation: Implement strong network segmentation to limit lateral movement if an endpoint is compromised. This can contain the breach and prevent it from spreading across the entire infrastructure.
- Regular Security Awareness Training: Educate users about phishing and social engineering tactics often used as initial infection vectors. A well-informed workforce is the first line of defense.
- Threat Intelligence Integration: Stay updated with the latest threat intelligence on Remcos and fileless attack techniques. Integrate this intelligence into your security tools for proactive detection and blocking.
Tools for Enhanced Detection and Mitigation
| Tool Name | Purpose | Link |
|---|---|---|
| Sysmon | Advanced logging for process creation, network connections, file creation timestamps, offering insights into suspicious activities. | https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon |
| Volatility Framework | Open-source memory forensics framework for extracting digital artifacts from volatile memory (RAM) samples. | https://www.volatilityfoundation.org/ |
| Microsoft Defender for Endpoint | XDR solution with strong behavioral detection and advanced threat hunting capabilities. | https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-for-endpoint |
| CrowdStrike Falcon Insight | Cloud-native EDR/XDR platform offering advanced behavioral AI and threat intelligence. | https://www.crowdstrike.com/products/endpoint-security/falcon-insight-xdr/ |
Looking Ahead: Adapting to Evolving Threats
The emergence of fileless Remcos attacks targeting EDR solutions highlights a critical trend: attackers are consistently evolving their methods to evade traditional defenses. Organizations must shift from a reactive to a proactive security posture, emphasizing behavioral analysis, memory integrity, and comprehensive threat intelligence. The battle against sophisticated malware like Remcos is ongoing, and continuous adaptation of defense strategies is paramount to maintaining digital security.


