UltraVNC Team released #UltraVNC version 1.8.2.2. https://uvnc.com/downloads/ultravnc.html
UltraVNC - UltraVNC VNC OFFICIAL SITE, Remote Desktop Free Opensource

VNC remote desktop support software for remote PC control. Free. Anydesk , teamviewer alternative

UltraVNC Team released #UltraVNC version 1.8.2.. https://uvnc.com/downloads/ultravnc.html
UltraVNC - UltraVNC VNC OFFICIAL SITE, Remote Desktop Free Opensource

VNC remote desktop support software for remote PC control. Free. Anydesk , teamviewer alternative

🚨 Update Your Detection Rules: New In-Memory Loader

We caught a highly evasive #HanGhost loader, designed to bypass traditional detection through layered obfuscation and in-memory execution. This activity targets corporate users handling payments, logistics, and contract workflows, expanding exposure across critical operations.

⚠️ The delivery chain combines obfuscated JavaScript, hidden PowerShell execution, and environment-variable staging.

In the second stage, the loader retrieves an image file and extracts an encrypted payload embedded at the end of the file, combining steganography with in-memory loading and making detection significantly harder ❗️

👾 The loader is used to deliver multiple malware families: #PureHVNC, #XWorm, #Meduza, #AgentTesla, and #Phantom, with some chains also deploying #UltraVNC, extending the impact from initial access to persistent remote control.

⚡️#ANYRUN Sandbox allows analysts to reconstruct the full execution chain, helping confirm complex multi-stage activity earlier and reduce MTTR.

🔗 JavaScript-to-Payload execution chain:

JS ➡️ PowerShell ➡️ in-memory .NET assembly ➡️ PNG payload ➡️ Malware

📈 The campaign shows wave-based activity, indicating ongoing development and scaling:

March 26 — early cluster

April 1–2 — first large multi-family wave

April 3 — focused wave (PureHVNC / AgentTesla / Phantom)

April 6 — PureHVNC-heavy activity

April 7 — new peak with split between PureHVNC and XWorm/Meduza clusters

April 8 — multi-family wave (PureHVNC / Phantom / AgentTesla)

April 9–13 — more focused wave dominated by PureHVNC, with Phantom, DarkCloud, Formbook, and Meduza also present

👨‍💻 See the analysis session and collect #IOCs to speed up detection and response: https://app.any.run/tasks/cc26155e-e8e9-442b-b000-8d1a1435e7db?utm_source=mastodon&utm_medium=post&utm_campaign=hanghost&utm_content=linktoservice&utm_term=130426

🔍 Use this TI Lookup query to pivot from IOCs, review related activity, and validate your detection coverage: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=hanghost&utm_content=linktotilookup&utm_term=130426#%7B%2522query%2522:%2522commandLine:%255C%2522bYPaSS%2520-Command%2520*iex%2520$env:%255C%2522%2522,%2522dateRange%2522:180%7D%20

👨‍💻 Equip your SOC with faster decisions and lower workload. See how #ANYRUN fits your workflows: https://any.run/enterprise/?utm_source=mastodon&utm_medium=post&utm_campaign=hanghost&utm_content=linktoenterprise&utm_term=130426

#cybersecurity #infosec

CVE Alert: CVE-2026-4962 - n/a - UltraVNC - RedPacket Security

A security flaw has been discovered in UltraVNC up to 1.6.4.0. Affected by this issue is some unknown functionality in the library version.dll of the

RedPacket Security
CVE Alert: CVE-2026-3787 - n/a - UltraVNC - RedPacket Security

A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an unknown function in the library cryptbase.dll of the component Windows Service.

RedPacket Security
UltraVNC 1.6.4.0 on Windows hit by HIGH-severity vuln (CVE-2026-3787): uncontrolled DLL search path in cryptbase.dll. Local attackers could escalate privileges. No patch yet — restrict access & monitor for DLL hijacking. https://radar.offseq.com/threat/cve-2026-3787-uncontrolled-search-path-in-ultravnc-8f16fda8 #OffSeq #Vuln #UltraVNC
CVE Alert: CVE-2020-37134 - UltraVNC Team - UltraVNC Viewer - RedPacket Security

UltraVNC Viewer 1.2.4.0 contains a denial of service vulnerability that allows attackers to crash the application by manipulating VNC Server input. Attackers

RedPacket Security
CVE Alert: CVE-2020-37133 - UltraVNC Team - UltraVNC Launcher - RedPacket Security

UltraVNC Launcher 1.2.4.0 contains a denial of service vulnerability in the Repeater Host configuration field that allows attackers to crash the application.

RedPacket Security
Celebrating the 23th anniversary of the UltraVNC (26th anniversary since the laying of the foundation stone)

Dear all, The project was born on December 5, 2002 (23 years), and it is still in development. Exactly 23 years ago, Sam wrote a message on "vnc-list"

UltraVNC
Dear all, we need help, an unknown people has requested the #UltraVNC #Wikipedia page removal after this 23th birthday. Can you improve the page? Thanks in advance!
- https://en.wikipedia.org/wiki/UltraVNC
UltraVNC - Wikipedia