Hackers Use XWorm RAT to Exploit Script Kiddies, Pwning 18,000 Gadgets

Crooks pwning crooks – Hackers exploit script kiddies with XWorm RAT, compromising 18,000+ units globally and stealing delicate knowledge through Telegram-based C&C.

CloudSEK has found a brand new marketing campaign involving a Trojanized model of the XWorm RAT builder. The malware unfold by way of varied channels, together with file-sharing providers (like Mega and Add.ee), Github repositories (corresponding to LifelsHex/FastCryptor and FullPenetrationTesting/888-RAT), Telegram channels (together with HAX_CRYPT and inheritedeu), and even Youtube and different web sites. 

This marketing campaign resulted in compromising over 18,459 units globally. The stolen knowledge included delicate data like browser credentials, Discord tokens, Telegram knowledge, and system data from the compromised units.

“This builder provides attackers with a streamlined tool to deploy and operate a highly capable RAT, which features advanced capabilities like system reconnaissance, data exfiltration, and command execution,” CloudSEK’s weblog put up authored by the corporate’s Risk Intelligence Researcher, Vikas Kundu, revealed.

Risk actors particularly distributed a modified XWorm RAT builder to focus on inexperienced attackers (aka Script Kiddies). As soon as put in, the malware exfiltrated delicate knowledge like browser credentials, Discord tokens, Telegram knowledge, and system data from the sufferer’s machine. It additionally boasted superior options like virtualization checks, the flexibility to change the registry, and intensive command and management capabilities.

Moreover, this malware depends on Telegram for its command and management performance. It used bot tokens and Telegram API calls to obtain instructions from the attacker and exfiltrate stolen knowledge.

Researchers have been in a position to determine and leverage a “kill switch” performance throughout the malware. This performance was used to disrupt operations on energetic units contaminated with the malware. Nevertheless, this method had limitations. Offline machines and Telegram’s fee limiting mechanisms prevented full disruption.

Primarily based on the investigation, researchers have been in a position to hyperlink the risk actor to aliases “@shinyenigma” and “@milleniumrat.” Moreover, they have been in a position to determine related GitHub accounts and a ProtonMail handle.

It’s price noting that XWorm has change into a persistent risk with Ukraine’s State Service of Particular Communications and Info Safety (SSSCIP) reporting its utilization in Russian cyber operations towards Ukraine within the first half of 2024. 

To guard towards such threats, organizations and people ought to use Endpoint Detection and Response (EDR) options to detect suspicious community exercise and even malware identification.

Moreover, community monitoring utilizing Intrusion Detection and Prevention Techniques (IDPS) can block communication between contaminated units and the malicious C&C server on Telegram. Proactive measures like blocking entry to recognized malicious URLs and imposing utility whitelisting can forestall malware from being downloaded and executed.

  1. P2PInfect: Self-Replicating Worm Hits Redis Cases
  2. FBI Warns of HiatusRAT Malware Concentrating on Webcams and DVRs
  3. Faux 7-Zip Exploit Code Traced to AI-Generated Misinterpretation
  4. NPM Bundle Disguised as an Ethereum Instrument Deploys Quasar RAT
  5. Black Basta-Fashion Assault Hits Inboxes with 1,165 Emails in 90 Minutes

Recent articles