Cofense Intelligence exposes how threat actors abuse Windows File Explorer and WebDAV servers to bypass browser security and push RATs to corporate targets. ThreatCofense Intelligence exposes how threat actors abuse Windows File Explorer and WebDAV servers to bypass browser security and push RATs to corporate targets. Threat

RAT Malware Via Windows Explorer Puts Crypto at Risk

2026/03/02 06:00
4 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Cofense Intelligence exposes how threat actors abuse Windows File Explorer and WebDAV servers to bypass browser security and push RATs to corporate targets.

Threat actors have found a way to push malware directly onto corporate machines without going through a web browser at all. Cofense Intelligence published findings on February 25, 2026, revealing an active campaign that weaponizes Windows File Explorer’s built-in ability to connect to remote WebDAV servers. The tactic sidesteps standard browser download warnings entirely. Most users have no idea that File Explorer can reach out to internet servers.

WebDAV is an old HTTP-based file management protocol. Few people use it today. But Windows still supports it natively inside File Explorer, even though Microsoft deprecated the feature in November 2023. That gap between deprecation and full removal is exactly what attackers are walking through.

When a Folder Is Not Really a Folder

According to Cofense Intelligence in their published report, campaign volume first appeared in February 2024, then spiked sharply in September 2024. It has remained active ever since. The attacks have not slowed. 87 percent of all Active Threat Reports tied to this tactic deliver multiple remote access trojans as final payloads. XWorm RAT, Async RAT, and DcRAT show up most often.

Must Read: Crypto Security Breach: January Hacks Total $86M, Phishing Skyrockets

How the Attack Actually Works

Victims receive phishing emails, often disguised as invoices in German. The emails carry either URL shortcut files (.url) or LNK shortcut files (.lnk). Both can silently open a WebDAV connection inside File Explorer. The user sees what looks like a local folder. It is not.

What makes this particularly damaging is the chain that follows. Scripts pull down additional scripts from separate WebDAV servers. Legitimate files mix in with malicious ones to blur detection. By the time a RAT lands, the delivery path has passed through several layers of obfuscation. Security tools that scan browser downloads miss the whole sequence.

The Cofense report notes that 50% of all affected campaigns are in German. English-language campaigns account for 30%. Italian and Spanish make up the rest. That split points directly at European corporate email accounts as the primary target pool.

You Might Also Like: npm Worm Steals Crypto Keys, Targets 19 Packages

Cloudflare Tunnel is doing heavy lifting for the attackers here. All ATRs tied to this tactic use free demo accounts on trycloudflare[.]com to host the malicious WebDAV servers. Cloudflare’s own infrastructure routes the victim’s connection. That makes the traffic look legitimate on first inspection. The demo accounts are short-lived by design, so threat actors pull them down fast after campaigns go active, cutting off forensic analysis.

Why Crypto Holders Face Serious Exposure

This is where it gets dangerous for anyone holding digital assets. RATs like XWorm and Async RAT give attackers persistent, remote access to an infected machine. That means clipboard contents, browser sessions, saved passwords, and crypto wallet files all sit within reach. Clipboard hijacking, a method already linked to hundreds of millions in crypto theft, becomes trivial once a RAT is running.

Phishing losses alone exceeded $300 million in January 2026, according to security tracking data. That figure dwarfs protocol hack losses in the same period. The attack methods documented by Cofense feed directly into that pipeline. A RAT dropped via WebDAV on a finance team employee’s machine is not just a corporate IT problem. It is a direct path to drained wallets and stolen keys.

Also Worth Your Attention: As Threats Increase, Crypto Wallet Security Will Be A Top Priority In 2026

What Organizations Need to Do Now

The Cofense report recommends hunting for network traffic to Cloudflare Tunnel demo instances specifically. EDR tools with behavioral analysis should flag.URL and .LNK files that reach out to remote servers. The harder fix is user education. Most people simply do not know that File Explorer’s address bar works like a browser.

Checking it the same way they would check a suspicious URL is the first line of defense. Similar abuse is possible through FTP and SMB. Both protocols see regular enterprise use, and both can reach external servers. The attack surface Cofense is documenting is wider than just WebDAV.

Related: Hacks and Security Incidents in 2025: A Year That Exposed Crypto’s Weakest Links

The full technical breakdown, including IOC tables and Cloudflare Tunnel domain examples tied to specific Active Threat Reports, is available in the Cofense Intelligence report published at cofense.com.

The post RAT Malware Via Windows Explorer Puts Crypto at Risk appeared first on Live Bitcoin News.

Market Opportunity
Octavia Logo
Octavia Price(VIA)
$0.0030055
$0.0030055$0.0030055
+1.22%
USD
Octavia (VIA) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Channel Factories We’ve Been Waiting For

The Channel Factories We’ve Been Waiting For

The post The Channel Factories We’ve Been Waiting For appeared on BitcoinEthereumNews.com. Visions of future technology are often prescient about the broad strokes while flubbing the details. The tablets in “2001: A Space Odyssey” do indeed look like iPads, but you never see the astronauts paying for subscriptions or wasting hours on Candy Crush.  Channel factories are one vision that arose early in the history of the Lightning Network to address some challenges that Lightning has faced from the beginning. Despite having grown to become Bitcoin’s most successful layer-2 scaling solution, with instant and low-fee payments, Lightning’s scale is limited by its reliance on payment channels. Although Lightning shifts most transactions off-chain, each payment channel still requires an on-chain transaction to open and (usually) another to close. As adoption grows, pressure on the blockchain grows with it. The need for a more scalable approach to managing channels is clear. Channel factories were supposed to meet this need, but where are they? In 2025, subnetworks are emerging that revive the impetus of channel factories with some new details that vastly increase their potential. They are natively interoperable with Lightning and achieve greater scale by allowing a group of participants to open a shared multisig UTXO and create multiple bilateral channels, which reduces the number of on-chain transactions and improves capital efficiency. Achieving greater scale by reducing complexity, Ark and Spark perform the same function as traditional channel factories with new designs and additional capabilities based on shared UTXOs.  Channel Factories 101 Channel factories have been around since the inception of Lightning. A factory is a multiparty contract where multiple users (not just two, as in a Dryja-Poon channel) cooperatively lock funds in a single multisig UTXO. They can open, close and update channels off-chain without updating the blockchain for each operation. Only when participants leave or the factory dissolves is an on-chain transaction…
Share
BitcoinEthereumNews2025/09/18 00:09
Nvidia (NVDA) vs AMD: The Ultimate AI Stock Showdown for 2025

Nvidia (NVDA) vs AMD: The Ultimate AI Stock Showdown for 2025

Nvidia (NVDA) dominates AI chips with superior margins and ecosystem. AMD challenges but trails. Compare both stocks to determine your best AI investment. The post
Share
Blockonomi2026/03/15 19:42
New Research Paper: Why Ripple Will Never Abandon XRP

New Research Paper: Why Ripple Will Never Abandon XRP

Crypto researcher SMQKE has shared excerpts from an academic publication to support the argument that XRP will remain integral to Ripple Labs’ operation. In a post
Share
Timestabloid2026/03/15 19:02