cognitive cybersecurity intelligence

News and Analysis

Search

Unmasking Xworm Payload Execution Path through Jailbreaking a Malicious JScript Loader

Unmasking Xworm Payload Execution Path through Jailbreaking a Malicious JScript Loader

Security researchers are investigating a sophisticated malware attack that uses a combination of techniques, including geofencing and multi-layered obfuscation, to deploy different types of malware based on a victim’s geographical location. US-based victims are targeted with the XWorm Remote Access Trojan, while victims outside the US are targeted with the Rhadamanthys information stealer. The hackers initiate the attack chain through scheduled tasks or fake CAPTCHAs.

Source: gbhackers.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts