Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities

0
Medium
Malware
Published: Tue Oct 07 2025 (10/07/2025, 10:36:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range of malicious actions on compromised hosts. "XWorm's modular design is built around a core client and an array of specialized components known as plugins," Trellix researchers Niranjan Hegde and Sijo Jacob said in an analysis published last week. "These plugins are

AI-Powered Analysis

AILast updated: 10/09/2025, 01:07:43 UTC

Technical Analysis

XWorm 6.0 is an advanced modular malware family targeting Windows systems, first identified in 2022 and linked to the threat actor EvilCoder. Its architecture consists of a core client and over 35 specialized plugin DLLs that enable diverse malicious functionalities such as remote desktop access, credential theft (including browser and application passwords), keylogging, screen capture, ransomware deployment, rootkit installation, and system persistence. The malware is primarily propagated through phishing campaigns employing malicious Windows shortcut (LNK) files and deceptive JavaScript attachments that execute PowerShell commands to inject the malware into legitimate Windows processes like RegSvcs.exe, evading detection. XWorm incorporates anti-analysis and anti-virtualization techniques to avoid sandbox detection and halts execution if a virtual environment is detected. Communication with its command-and-control (C2) server is encrypted and supports commands to download and load plugins dynamically into memory, enabling flexible and stealthy operations. The malware also facilitates secondary infections by serving as a conduit for other malware families such as DarkCloud Stealer, Snake KeyLogger, and Remcos RAT. Despite the original developer XCoder's disappearance in late 2024, the malware persists through cracked versions and new operators like XCoderTools offering a fully recoded 6.0 version with fixes for prior vulnerabilities. The malware’s plugins cover a broad spectrum of capabilities, including stealing Windows product keys, Wi-Fi passwords, browser credentials (bypassing Chrome’s app-bound encryption), file system manipulation, executing system commands, recording via webcam, and ransomware encryption. The modularity and continuous evolution of XWorm make it a versatile and persistent threat in the Windows malware landscape.

Potential Impact

For European organizations, XWorm 6.0 poses a multifaceted threat impacting confidentiality, integrity, and availability. Its ability to steal sensitive credentials from browsers and applications threatens intellectual property, personal data, and corporate secrets, potentially leading to data breaches and regulatory penalties under GDPR. The ransomware plugin can encrypt critical files, causing operational disruption and financial loss. The malware’s remote access and command execution capabilities enable attackers to manipulate systems, exfiltrate data, and conduct further attacks such as DDoS, undermining business continuity. The use of phishing and social engineering as primary infection vectors exploits human vulnerabilities, increasing infection likelihood. The malware’s anti-analysis features complicate detection and response efforts, potentially allowing prolonged undetected presence in networks. Secondary infections facilitated by XWorm can introduce additional malware strains, compounding risks. European sectors with high reliance on Windows infrastructure, such as finance, manufacturing, healthcare, and government, are particularly vulnerable. The threat also raises concerns for critical infrastructure and supply chain security, given its capability to persist and spread stealthily.

Mitigation Recommendations

European organizations should implement a layered defense strategy tailored to XWorm’s tactics. First, enhance phishing detection and user awareness training focused on identifying malicious LNK files, JavaScript attachments, and deceptive download sites. Employ advanced email filtering and sandboxing to block malicious payloads. Restrict PowerShell usage by enforcing constrained language mode, logging, and blocking unsigned scripts to disrupt XWorm’s execution chain. Monitor for anomalous process injections, especially into legitimate Windows processes like RegSvcs.exe, using endpoint detection and response (EDR) tools with behavior-based detection. Implement strict application whitelisting to prevent unauthorized DLL loading and execution. Regularly audit and harden Windows Registry settings to prevent persistence mechanisms like ResetSurvival.dll. Deploy network segmentation and monitor outbound connections to detect and block communications with known C2 servers such as 94.159.113.64:4411. Maintain up-to-date backups with offline copies to mitigate ransomware impact. Investigate and remove secondary malware infections promptly. Finally, collaborate with threat intelligence sharing platforms to stay informed about emerging XWorm variants and indicators of compromise.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/10/xworm-60-returns-with-35-plugins-and.html","fetched":true,"fetchedAt":"2025-10-09T01:05:06.997Z","wordCount":1607}

Threat ID: 68e70a4432de7eb26af4e153

Added to database: 10/9/2025, 1:05:08 AM

Last enriched: 10/9/2025, 1:07:43 AM

Last updated: 11/23/2025, 3:19:22 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats