Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PlugX USB Worm Exploits DLL Sideloading Globally

PlugX USB Worm Exploits DLL Sideloading Globally

Posted on April 14, 2026 By CWS

A new variant of the PlugX worm is spreading stealthily across continents by embedding itself in USB drives, reaching regions spanning nearly ten time zones. Initially identified in Papua New Guinea in August 2022, it reemerged in January 2023 in both Papua New Guinea and Ghana, which are separated by approximately 10,000 miles. Subsequent infections were reported in Mongolia, Zimbabwe, and Nigeria, marking a significant geographical spread.

Global Spread of PlugX Worm

The PlugX malware is not a new threat; it is a remote access Trojan (RAT) originating from China that has been utilized by cybercriminals for years. This new variant is distinguished by a novel payload and its connection to a command-and-control (C2) server previously not closely associated with this malware family. The worm employs DLL sideloading, a method that coerces a legitimate application into loading a malicious library, allowing the malware to execute its code without immediate detection.

Technical Analysis and Infection Mechanism

Researchers from Sophos X-Ops, led by analyst Gabor Szappanos, uncovered this variant following a CryptoGuard alert, likely triggered by a data theft attempt. The infection package comprises a legitimate AvastSvc.exe executable, vulnerable to DLL sideloading, a malicious DLL called wsc.dll, and an encrypted payload file. These components collaborate to discreetly operate the PlugX backdoor on compromised systems.

The C2 activity was traced to IP address 45.142.166[.]112, previously mentioned in a 2019 report by Unit 42 as loosely connected to PlugX but not directly linked to any known threat actor. Sophos researchers now assert that the tactics used are consistent with those of PKPLUG, also known as Mustang Panda, a China-linked advanced persistent threat (APT) group.

Preventive Measures Against USB-Based Malware

The PlugX variant uses deception as its core infection strategy. When the worm copies itself onto a USB drive, it utilizes specific mutex strings, USB_NOTIFY_COP and USB_NOTIFY_INF, to manage the operation. Once transferred, the USB drive appears empty in a standard Windows Explorer view, masking the presence of a shortcut file designed to resemble another removable disk.

Clicking the shortcut silently executes the CEFHelper executable, a renamed AvastSvc.exe file, disguised to resemble a legitimate Adobe process. Other malicious files and directories are hidden by default in file listings. The worm stores its components within a directory named RECYCLER.BIN, using a desktop.ini file to mimic a genuine Recycle Bin, further concealing its activities.

Organizations should view USB connections as potential security threats, especially in environments handling sensitive information. Disabling AutoRun and AutoPlay for all removable media is a straightforward yet effective preventive measure. IT departments should also configure systems to display hidden and system files by default, which can help detect suspicious directories like RECYCLER.BIN. Regularly monitoring outbound C2 traffic and using endpoint protection that detects DLL sideloading activities are crucial steps for any organization confronting this targeted threat.

For more updates, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google.

Cyber Security News Tags:APT group, Cybersecurity, DLL Sideloading, Malware, Mustang Panda, PKPLUG, PlugX, remote access trojan, Sophos, USB worm

Post navigation

Previous Post: AI Threats Loom: CISOs Urged to Strengthen Cybersecurity
Next Post: Data Breach Affects 1 Million Members at Europe’s Top Gym

Related Posts

ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users Cyber Security News
4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign 4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign Cyber Security News
10 Best NGINX Monitoring Tools 10 Best NGINX Monitoring Tools Cyber Security News
Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets Cyber Security News
Critical Vulnerability in Python PLY Library Enables Remote Code Execution Critical Vulnerability in Python PLY Library Enables Remote Code Execution Cyber Security News
New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • April 2026 Microsoft Patch Tuesday: Key Vulnerabilities
  • Fortinet Urges Immediate Patching for Critical Vulnerabilities
  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws
  • Earn CPE Credits with SRA’s Purple Team Exercises
  • Critical PHP Composer Vulnerabilities Patched

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • April 2026 Microsoft Patch Tuesday: Key Vulnerabilities
  • Fortinet Urges Immediate Patching for Critical Vulnerabilities
  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws
  • Earn CPE Credits with SRA’s Purple Team Exercises
  • Critical PHP Composer Vulnerabilities Patched

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark