Weaponized JPEG File Drops Trojanized ScreenConnect Backdoor on Windows


A new malware campaign called Operation SilentCanvas is using a file disguised as a JPEG image to deploy a trojanized version of ConnectWise ScreenConnect on Windows systems. The attack uses social engineering, PowerShell, and trusted Windows tools to gain stealthy remote access.

Security researchers at CYFIRMA said the campaign starts with a file named sysupdate.jpeg. Although it appears to be an image, the file contains a malicious PowerShell payload that sets up the next stages of the attack.

The goal is not just quick infection. The malware installs a modified remote access framework that can support surveillance, credential theft, hidden desktop activity, command execution, and long-term persistence inside a compromised environment.

Operation SilentCanvas hides malware behind a fake image

The attack likely reaches victims through phishing emails, fake update prompts, malicious attachments, or deceptive file-sharing links. The filename helps lower suspicion because many users treat image files as harmless.

Once the victim runs the disguised file, the PowerShell payload creates a staging folder on the system and starts downloading additional components from attacker-controlled infrastructure.

CYFIRMA said the malware uses the domain legitserver.theworkpc[.]com and communicates over non-standard ports, including 5443 and 8041. The campaign also uses encryption to hide command-and-control traffic.

Key facts at a glance

ItemDetails
Campaign nameOperation SilentCanvas
Main luresysupdate.jpeg
Initial payloadPowerShell script disguised as an image file
Target platformWindows
Remote access tool abusedConnectWise ScreenConnect
Persistence service nameOneDriveServers
Commonly abused Windows toolscsc.exe, cvtres.exe, ComputerDefaults.exe
Main riskRemote access, credential theft, surveillance, and lateral movement

How the infection chain works

The PowerShell payload creates a hidden staging folder and downloads a trojanized ScreenConnect package. ScreenConnect is a legitimate remote access tool, but attackers can abuse modified versions to blend malicious activity with trusted enterprise software.

The malware also downloads another payload named access.jpeg and runs parts of the attack in memory. This reduces the number of obvious executable files written to disk and makes the infection harder to detect with simple file scanning.

To avoid static detection, the malware reconstructs dangerous command strings at runtime. It also uses Microsoft’s legitimate .NET compiler, csc.exe, to build a custom launcher directly on the victim’s machine.

The malware uses Windows tools to bypass UAC

After compiling the launcher, the malware abuses the ms-settings protocol registry path and triggers ComputerDefaults.exe. This technique lets the payload run with elevated privileges without showing the usual User Account Control prompt.

The registry change is temporary. The malware removes the key within seconds, which makes forensic review harder if investigators arrive after execution.

This living-off-the-land approach matters because the attack does not depend only on unknown malware files. It also relies on trusted Windows binaries that many organizations allow by default.

Trojanized ScreenConnect gives attackers remote control

Once deployed, the modified ScreenConnect framework gives attackers persistent access to the infected system. CYFIRMA said the malware can support remote command execution, file transfer, hidden desktop interaction, and SYSTEM-level execution.

The framework also includes surveillance capabilities. Researchers found support for screen capture, screen recording, microphone capture, speaker audio capture, clipboard monitoring, and print job interception.

The campaign also includes credential theft features, including credential provider interception and plaintext credential harvesting. This makes the infection especially dangerous on enterprise workstations and administrator machines.

Why the attack is difficult to detect

Operation SilentCanvas combines several evasion methods in one chain. It uses PowerShell, in-memory execution, dynamic compilation, signed binary abuse, registry-based privilege escalation, and encrypted command-and-control channels.

Security tools may miss the attack if they focus only on obvious executable downloads. The malware builds parts of itself locally and hides behind tools that already exist on Windows systems.

The use of ScreenConnect also complicates detection. Many companies use remote monitoring and management tools for legitimate IT support, so defenders must separate approved remote access from unexpected or modified deployments.

What security teams should monitor

  • Unexpected execution of files named sysupdate.jpeg or access.jpeg.
  • PowerShell activity launched from user download folders or email attachment paths.
  • New folders such as C:\Systems or C:\ProgramData\OneDriveServer\.
  • Unexpected ScreenConnect activity on systems that do not normally use it.
  • Execution of csc.exe, cvtres.exe, or ComputerDefaults.exe from unusual parent processes.
  • Changes to the ms-settings registry path used for UAC bypass attempts.
  • New Windows services using names that mimic Microsoft or OneDrive components.
  • Outbound traffic to legitserver.theworkpc[.]com or 45[.]138[.]16[.]64.

What organizations should do now

Organizations should restrict unmanaged PowerShell execution and review which users can run scripts from temporary, download, and email attachment locations. Blocking or tightly monitoring csc.exe and related compiler activity can also reduce risk.

Remote access platforms need stronger control. Security teams should maintain an approved inventory of ScreenConnect deployments and investigate any unknown installation immediately.

If a system shows signs of this campaign, teams should isolate it, collect forensic evidence, remove suspicious services, terminate malicious PowerShell activity, and rotate privileged credentials that may have been exposed.

FAQ

What is Operation SilentCanvas?

Operation SilentCanvas is a malware campaign that uses a PowerShell payload disguised as a JPEG file to deploy a trojanized ScreenConnect remote access framework on Windows systems.

Is sysupdate.jpeg a real image file?

No. Researchers said the file does not behave like a normal JPEG image. It contains malicious PowerShell logic designed to start the infection chain.

What does the trojanized ScreenConnect malware do?

It can give attackers remote access, command execution, file transfer, credential interception, screen capture, audio capture, clipboard monitoring, and long-term persistence.

How does the malware gain administrator rights?

It abuses the ms-settings registry path and ComputerDefaults.exe to perform a fileless UAC bypass, allowing elevated execution without a visible prompt.

Summary

  1. Operation SilentCanvas uses a file named sysupdate.jpeg to hide a PowerShell payload.
  2. The attack deploys a trojanized version of ConnectWise ScreenConnect.
  3. The malware abuses csc.exe, cvtres.exe, and ComputerDefaults.exe to evade detection and elevate privileges.
  4. The framework supports credential theft, remote commands, surveillance, file transfer, and persistence.
  5. Security teams should monitor suspicious PowerShell, ScreenConnect activity, UAC bypass traces, and unexpected Windows services.
Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages