{"id":90489,"date":"2018-07-26T06:00:32","date_gmt":"2018-07-26T13:00:32","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=90489"},"modified":"2025-05-28T23:01:47","modified_gmt":"2025-05-29T06:01:47","slug":"cactustorch-fileless-threat-abuses-net-to-infect-victims","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/","title":{"rendered":"CactusTorch Fileless Threat Abuses .NET to Infect Victims"},"content":{"rendered":"<p>McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to attack systems. One of the most popular techniques is a <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/solution-briefs\/sb-fileless-malware-execution.pdf\">\u201cfileless\u201d attack.<\/a> Because these attacks are launched through reputable executables, they are hard to detect. Both consumers and corporate users can fall victim to this threat. In corporate environments, attackers use this vector to move laterally through the network.<\/p>\n<p>One fileless threat, CactusTorch, uses the DotNetToJScript technique, which loads and executes malicious .NET assemblies straight from memory. These assemblies are the smallest unit of deployment of an application, such as a .dll or .exe. As with other fileless attack techniques, DotNetToJScript does not write any part of the malicious .NET assembly on a computer\u2019s hard drive; hence traditional file scanners fail to detect these attacks.<\/p>\n<p>In 2018 we have seen rapid growth in the use of CactusTorch, which can execute custom <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shellcode\">shellcode<\/a> on Windows systems. The following chart shows the rise of CactusTorch variants in the wild.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90491\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png\" alt=\"\" width=\"884\" height=\"455\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png 884w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1-300x154.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1-768x395.png 768w\" sizes=\"auto, (max-width: 884px) 100vw, 884px\" \/><\/a><\/p>\n<p><em>Source: McAfee Labs.<\/em><\/p>\n<h2><strong>The DotNetToJScript tool kit<\/strong><\/h2>\n<p>Compiling the DotNetToJScript tool gives us the .NET executable DotNetToJScript.exe, which accepts the path of a .NET assembly and outputs a JavaScript file.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90492\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-2.png\" alt=\"\" width=\"800\" height=\"450\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-2.png 800w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-2-300x169.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-2-768x432.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p><em>Figure 1: Using DotNetToJScript.exe to create a malicious JavaScript file. <\/em><\/p>\n<p>The DotNetToJScript tool kit is never shipped with malware. The only component created is the output JavaScript file, which is executed on the target system by the script host (wscript.exe). For our analysis, we ran some basic deobfuscation and found <a href=\"https:\/\/github.com\/mdsecactivebreach\/CACTUSTORCH\">CactusTorch<\/a>, which had been hidden by some online tools:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90493\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-3.png\" alt=\"\" width=\"1101\" height=\"623\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-3.png 1101w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-3-300x170.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-3-768x435.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-3-1024x579.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-3-884x500.png 884w\" sizes=\"auto, (max-width: 1101px) 100vw, 1101px\" \/><\/a><\/p>\n<p><em>Figure 2: CactusTorch code.<\/em><\/p>\n<p>Before we dive into this code, we need to understand .NET and its COM exposure. When we install the .NET framework on any system, several .NET libraries are exposed via Microsoft\u2019s Component Object Model (COM).<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90494\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-4.png\" alt=\"\" width=\"1069\" height=\"260\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-4.png 1069w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-4-300x73.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-4-768x187.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-4-1024x249.png 1024w\" sizes=\"auto, (max-width: 1069px) 100vw, 1069px\" \/><\/a><\/p>\n<p><em>Figure 3: COM exposing the .NET library System.Security.Cryptography.FromBase64Transform.<\/em><\/p>\n<p>If we look at the exposed interfaces, we can see IDispatch, which allows the COM object to be accessed from the script host or a browser.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90495\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-5.png\" alt=\"\" width=\"404\" height=\"240\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-5.png 404w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-5-300x178.png 300w\" sizes=\"auto, (max-width: 404px) 100vw, 404px\" \/><\/a><\/p>\n<p><em>Figure 4: Exposed interfaces in a .NET library.<\/em><\/p>\n<p>To execute malicious code using the DotNetToJScript vector, an attack uses the following COM objects:<\/p>\n<ul>\n<li>Text.ASCIIEncoding<\/li>\n<li>Security.Cryptography.FromBase64Transform<\/li>\n<li>IO.MemoryStream<\/li>\n<li>Runtime.Serialization.Formatters.Binary.BinaryFormatter<\/li>\n<li>Collections.ArrayList<\/li>\n<\/ul>\n<p>Now, let\u2019s return to the JavaScript code we saw in Figure 2. The function base64ToStream()converts the Base64-encoded serialized object to a stream. Before we can fully understand the logic behind the JavaScript code, we need to examine the functionality of the Base64-encoded serialized object. Thus our next step is to reverse engineer the embedded serialized object and recreate the class definition. Once that was done, the class definition looks like the following code, which is responsible for executing the malicious shellcode. (Special thanks to Casey Smith, @subTee, for important pointers regarding this step).<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90496\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-6.png\" alt=\"\" width=\"1017\" height=\"404\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-6.png 1017w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-6-300x119.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-6-768x305.png 768w\" sizes=\"auto, (max-width: 1017px) 100vw, 1017px\" \/><\/a><\/p>\n<p><em>Figure 5: The class definition of the embedded serialized object.<\/em><\/p>\n<p>Now we have the open-source component of <a href=\"https:\/\/github.com\/mdsecactivebreach\/CACTUSTORCH\/tree\/master\/CACTUSTORCH.cs\">CactusTorch<\/a>, and the JavaScript code in Figure 2 makes sense. We can see how the malicious shellcode is executed on the targeted system. In Figure 2, line 29 the code invokes the flame(x,x) function with two arguments: the executable to launch and the shellcode.<\/p>\n<p>The .NET assembly embedded in the CactusTorch script runs the following steps to execute the malicious shellcode:<\/p>\n<ul>\n<li>Launches a new suspended process using CreateProcessA (to host the shellcode)<\/li>\n<li>Allocates some memory with VirtualAllocEx() with an EXECUTE_READWRITE privilege<\/li>\n<li>Writes the shellcode in the target\u2019s process memory with WriteProcessMemory()<\/li>\n<li>Creates a new thread to execute the shellcode using CreateRemoteThread()<\/li>\n<\/ul>\n<h2><strong>Conclusion <\/strong><\/h2>\n<p>Fileless malware takes advantage of the trust factor between security software and genuine, signed Windows applications. Because this type of attack is launched through reputable, trusted executables, these attacks are hard to detect. McAfee Endpoint Security (ENS) and Host Intrusion Prevention System (HIPS) customers are protected from this class of fileless attack through Signature ID 6118.<\/p>\n<h2><strong>\u00a0<\/strong><strong>Acknowledgements<\/strong><\/h2>\n<p>The author thanks the following colleagues for their help with this analysis:<\/p>\n<ul>\n<li>Abhishek Karnik<\/li>\n<li>Deepak Setty<\/li>\n<li>Oliver Devane<\/li>\n<li>Shruti Suman<\/li>\n<\/ul>\n<h2><strong>References <\/strong><\/h2>\n<ul>\n<li><a href=\"https:\/\/ruxcon.org.au\/assets\/2017\/slides\/NET-Interop-Full.pdf\">https:\/\/ruxcon.org.au\/assets\/2017\/slides\/NET-Interop-Full.pdf<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/tyranid\/DotNetToJScript\">https:\/\/github.com\/tyranid\/DotNetToJScript<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/mdsecactivebreach\/CACTUSTORCH\">https:\/\/github.com\/mdsecactivebreach\/cactustorch<\/a><\/li>\n<\/ul>\n<h2><strong>MITRE ATT&amp;CK techniques<\/strong><\/h2>\n<ul>\n<li>Drive-by compromise<\/li>\n<li>Scripting using Windows Script Host<\/li>\n<li>Decode information<\/li>\n<li>Command-line interface<\/li>\n<li>Process injection<\/li>\n<\/ul>\n<h2><strong>Hashes<\/strong><\/h2>\n<ul>\n<li>4CF9863C8D60F7A977E9DBE4DB270819<\/li>\n<li>5EEFBB10D0169D586640DA8C42DD54BE<\/li>\n<li>69A2B582ED453A90CC06345886F03833<\/li>\n<li>74172E8B1F9B7F9DB600C57E07368B8F<\/li>\n<li>86C47B9E0F43150FEFF5968CF4882EBB<\/li>\n<li>89F87F60137E9081F40E7D9AD5FA8DEF<\/li>\n<li>8A33BF71E8740BDDE23425BBC6259D8F<\/li>\n<li>8DCCC9539A499D375A069131F3E06610<\/li>\n<li>924B7FB00E930082CE5B96835FDE69A1<\/li>\n<li>B60E085150D53FCE271CD481435C6E1E<\/li>\n<li>BC7923B43D4C83D077153202D84EA603<\/li>\n<li>C1A7315FB68043277EE57BDBD2950503<\/li>\n<li>D2095F2C1D8C25AF2C2C7AF7F4DD4908<\/li>\n<li>D5A07C27A8BBCCD0234C81D7B1843FD4<\/li>\n<li>E0573E624953A403A2335EEC7FFB1D83<\/li>\n<li>E1677A25A047097E679676A459C63A42<\/li>\n<li>F0BC5DFD755B7765537B6A934CA6DBDC<\/li>\n<li>F6526E6B943A6C17A2CC96DD122B211E<\/li>\n<li>CDB73CC7D00A2ABB42A76F7DFABA94E1<\/li>\n<li>D4EB24F9EB1244A5BEAA19CF69434127<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526,4452,338,180],"coauthors":[3973],"class_list":["post-90489","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-advanced-threat-research","tag-cybersecurity","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CactusTorch Fileless Threat Abuses .NET to Infect Victims | McAfee Blog<\/title>\n<meta name=\"description\" content=\"McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to attack systems. One\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CactusTorch Fileless Threat Abuses .NET to Infect Victims | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to attack systems. One\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-26T13:00:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T06:01:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"884\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"CactusTorch Fileless Threat Abuses .NET to Infect Victims\",\"datePublished\":\"2018-07-26T13:00:32+00:00\",\"dateModified\":\"2025-05-29T06:01:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/\"},\"wordCount\":866,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png\",\"keywords\":[\"Advanced Threat Research\",\"cybersecurity\",\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/\",\"name\":\"CactusTorch Fileless Threat Abuses .NET to Infect Victims | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png\",\"datePublished\":\"2018-07-26T13:00:32+00:00\",\"dateModified\":\"2025-05-29T06:01:47+00:00\",\"description\":\"McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to attack systems. One\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"CactusTorch Fileless Threat Abuses .NET to Infect Victims\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CactusTorch Fileless Threat Abuses .NET to Infect Victims | McAfee Blog","description":"McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to attack systems. One","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"CactusTorch Fileless Threat Abuses .NET to Infect Victims | McAfee Blog","og_description":"McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to attack systems. One","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-07-26T13:00:32+00:00","article_modified_time":"2025-05-29T06:01:47+00:00","og_image":[{"width":884,"height":455,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"CactusTorch Fileless Threat Abuses .NET to Infect Victims","datePublished":"2018-07-26T13:00:32+00:00","dateModified":"2025-05-29T06:01:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/"},"wordCount":866,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png","keywords":["Advanced Threat Research","cybersecurity","endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/","name":"CactusTorch Fileless Threat Abuses .NET to Infect Victims | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png","datePublished":"2018-07-26T13:00:32+00:00","dateModified":"2025-05-29T06:01:47+00:00","description":"McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to attack systems. One","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/07\/20180724-Cactus-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cactustorch-fileless-threat-abuses-net-to-infect-victims\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"CactusTorch Fileless Threat Abuses .NET to Infect Victims"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=90489"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90489\/revisions"}],"predecessor-version":[{"id":214665,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90489\/revisions\/214665"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=90489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=90489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=90489"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=90489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}