Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Posted on September 13, 2025September 13, 2025 By CWS

Cybersecurity researchers have uncovered a complicated malware marketing campaign that exploits SVG (Scalable Vector Graphics) information and e mail attachments to distribute harmful Distant Entry Trojans, particularly XWorm and Remcos RAT.

This rising menace represents a major evolution in assault methodologies, as menace actors more and more flip to non-traditional file codecs to bypass standard safety defenses.

The marketing campaign employs a number of supply vectors, together with direct e mail attachments containing malicious EML information and URLs hosted on trusted platforms like ImageKit.

These ZIP archives comprise extremely obfuscated BAT scripts that function the preliminary an infection stage, using superior strategies to evade static detection mechanisms.

The malware’s fileless execution strategy permits it to function completely in reminiscence, making detection significantly tougher for conventional endpoint safety options.

Seqrite researchers recognized two distinct marketing campaign variants throughout their evaluation, revealing an evolving menace panorama the place attackers constantly refine their strategies.

The primary marketing campaign delivers BAT scripts straight by means of e mail attachments, whereas the second introduces SVG information embedded with JavaScript as a novel supply mechanism.

An infection Chain (Supply – Seqrite)

These SVG information seem as reliable picture information however comprise embedded scripts that mechanically set off malicious payload downloads when rendered in susceptible environments or embedded inside phishing pages.

The assault chain demonstrates exceptional sophistication in its execution methodology. As soon as the preliminary ZIP file is extracted, victims encounter a closely obfuscated BAT script designed to seem benign whereas executing complicated malicious operations.

This script leverages PowerShell to carry out in-memory payload injection, successfully bypassing conventional file-based detection methods.

Superior Evasion and Persistence Mechanisms

The malware employs subtle evasion strategies that concentrate on core Home windows safety mechanisms. The PowerShell element programmatically disables each AMSI (Antimalware Scan Interface) and ETW (Occasion Tracing for Home windows) by means of dynamic .NET reflection and delegate creation.

Obfuscated and deobfuscated bat information (Supply – Seqrite)

The assault resolves native capabilities together with GetProcAddress, GetModuleHandle, VirtualProtect, and AmsiInitialize to find and patch the AmsiScanBuffer perform in reminiscence.

The persistence mechanism includes creating BAT information inside the Home windows Startup folder, guaranteeing automated execution upon system restart or consumer login.

The PowerShell script searches for Base64-encoded payloads hidden inside batch file feedback, particularly concentrating on traces prefixed with triple-colon markers.

These payloads bear a number of layers of decryption, together with AES decryption utilizing hardcoded keys and GZIP decompression earlier than ultimate execution.

The loader element capabilities as a essential middleman, extracting and executing embedded .NET assemblies straight in reminiscence utilizing Meeting.Load operations.

This strategy eliminates the necessity for disk-based file creation, considerably lowering detection chance whereas sustaining full operational functionality for deploying XWorm and Remcos RAT payloads.

Increase your SOC and assist your workforce defend what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attachments, Attack, Deliver, Email, Leverages, Malware, RAT, Remcos, SVGs, XWorm

Post navigation

Previous Post: What Are The Takeaways from The Scattered Lapsus $Hunters Statement?
Next Post: Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Related Posts

Ukraine Police Exposed Russian Hacker Group Specializes in Ransomware Attack Ukraine Police Exposed Russian Hacker Group Specializes in Ransomware Attack Cyber Security News
Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen  Million from Victims Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims Cyber Security News
AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars Cyber Security News
North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials Cyber Security News
Security Researchers Expose Lazarus Recruitment Pipeline Live on Camera Through Honeypot Operation Security Researchers Expose Lazarus Recruitment Pipeline Live on Camera Through Honeypot Operation Cyber Security News
Breaking Down Silos Aligning IT and Security Teams Breaking Down Silos Aligning IT and Security Teams Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark