Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
XWorm RAT Campaign Evades Detection with Excel Exploit

XWorm RAT Campaign Evades Detection with Excel Exploit

Posted on February 13, 2026 By CWS

In a recent cybersecurity alert, experts have identified a phishing campaign that deploys an updated version of the XWorm Remote Access Trojan (RAT). This malware grants cybercriminals comprehensive control over infected Microsoft Windows systems, posing significant risks to users.

Background on XWorm RAT

First tracked in 2022, XWorm remains a prevalent threat within the digital security landscape. It is commonly circulated via Telegram-based marketplaces, making it easily accessible to a wide range of threat actors. Its persistent use underscores the need for continuous vigilance against such cyber threats.

The latest campaign employs a variety of business-themed emails, such as those related to payment verifications and shipment confirmations, to lure recipients into opening a harmful Excel add-in file (.XLAM). This tactic effectively initiates a rapid transition from document execution to the delivery of malware directly into the system’s memory.

Technical Breakdown of the Attack

The campaign was uncovered by Fortinet researchers, who detailed how the malicious Excel file exploits the CVE-2018-0802 vulnerability. This flaw in Microsoft’s Equation Editor allows remote code execution, providing a pathway for attackers to inject harmful code into a system.

Once activated, the exploit downloads an HTA file from a specified URL and executes it using ShellExecuteExW. This transition helps the malicious operation remain inconspicuous, as it mimics typical Windows processes while the harmful payload is prepared.

Payload Execution and Defense

Subsequently, the obfuscated HTA file, executed under mshta.exe, deploys a Base64-encoded PowerShell payload. This payload retrieves a hidden .NET module from an image file hosted online. The module, cleverly disguised with the assembly name Microsoft.Win32.TaskScheduler, operates in memory, making detection more challenging.

The final step involves the .NET loader decrypting and executing the XWorm payload by using process hollowing to inject it into Msbuild.exe. The RAT then communicates with a command-and-control server using encrypted traffic. To counter this, cybersecurity professionals advise patching the Equation Editor vulnerability, restricting .XLAM and HTA execution paths, and implementing strict controls on mshta.exe, PowerShell, and Msbuild.exe activities.

As cyber threats evolve, staying informed and implementing robust security measures are crucial. Follow us for more updates on emerging cyber threats and defenses.

Cyber Security News Tags:CVE-2018-0802, Cybersecurity, Excel exploit, Fortinet, Malware, Phishing, PowerShell, RAT, remote access trojan, Windows, XWorm

Post navigation

Previous Post: UAT-9921 Targets Tech and Finance with VoidLink Malware
Next Post: Russian Group Linked to Malware Attacks on Ukraine

Related Posts

Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition Cyber Security News
Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested Cyber Security News
PoC Exploit Released for Critical Outlook 0-Click Remote Code Execution Vulnerability PoC Exploit Released for Critical Outlook 0-Click Remote Code Execution Vulnerability Cyber Security News
Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks Cyber Security News
APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators Cyber Security News
Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Global Cyber Threats Target Defense Sector Amid Rising Tensions
  • Fake AI Chrome Extensions Compromise Over 260,000 Users
  • Russian Group Linked to Malware Attacks on Ukraine
  • XWorm RAT Campaign Evades Detection with Excel Exploit
  • UAT-9921 Targets Tech and Finance with VoidLink Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Global Cyber Threats Target Defense Sector Amid Rising Tensions
  • Fake AI Chrome Extensions Compromise Over 260,000 Users
  • Russian Group Linked to Malware Attacks on Ukraine
  • XWorm RAT Campaign Evades Detection with Excel Exploit
  • UAT-9921 Targets Tech and Finance with VoidLink Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News