Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT

Posted on June 20, 2025June 21, 2025 By CWS

Cybersecurity professionals throughout East and Southeast Asia are going through a complicated new risk as China-linked attackers deploy a weaponized MSI installer disguised as a reputable WhatsApp setup package deal.

This malicious marketing campaign represents a major escalation in social engineering techniques, leveraging the recognition and belief related to the widely-used messaging platform to infiltrate company and private techniques.

The assault demonstrates superior technical sophistication by way of its multi-layered method to malware deployment and system compromise.

The risk actors have crafted an elaborate assault chain that begins with the distribution of trojanized MSI installers, fastidiously designed to imitate genuine WhatsApp set up packages.

Broadcom analysts recognized this marketing campaign as significantly regarding on account of its focused nature and the superior methods employed to evade conventional safety measures.

The malware employs encrypted shellcode embedded inside seemingly innocuous picture recordsdata, making preliminary detection considerably tougher for typical antivirus options.

As soon as executed, the malicious installer deploys PowerShell scripts that set up persistence by way of scheduled duties, making certain the malware maintains its foothold on contaminated techniques even after reboots.

The ultimate payload represents a closely modified model of the XWorm Distant Entry Trojan, enhanced with specialised features designed to detect Telegram installations on compromised techniques.

This modification suggests the attackers are particularly concerned about monitoring communications platforms, doubtlessly for espionage or additional social engineering assaults.

The marketing campaign’s technical sophistication extends to its communication infrastructure, the place contaminated techniques report again to command-and-control servers by way of Telegram-based mechanisms, successfully utilizing reputable messaging platforms to masks malicious visitors.

Superior An infection Mechanism and Evasion Strategies

The malware’s an infection mechanism demonstrates exceptional technical complexity by way of its use of encrypted shellcode loaders embedded inside picture recordsdata.

This system, referred to as steganography, permits the malicious code to cover in plain sight by concealing executable content material inside the pixel knowledge of seemingly innocent photographs.

The shellcode loaders are designed to extract and execute the encrypted payload solely when particular situations are met, making dynamic evaluation harder for safety researchers.

Symantec’s safety techniques have recognized a number of detection signatures together with Trojan.Gen.MBT and varied heuristic identifiers comparable to Heur.AdvML.A collection, indicating the malware‘s subtle evasion capabilities.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free trial

Cyber Security News Tags:Beware, Delivers, Installer, Mimic, Modified, MSI, RAT, Weaponized, WhatsApp, XWorm

Post navigation

Previous Post: Record Breaking 7.3 Tbps DDoS Attack Blasting 37.4 Terabytes in Just 45 Seconds
Next Post: Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency

Related Posts

Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone Cyber Security News
New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT Cyber Security News
DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators Cyber Security News
Microsoft to Launch New Secure Default Settings for Exchange and Teams APIs Cyber Security News
Android 16 Comes with Advanced Device-level Security Setting Protection for 3 Billion Devices Cyber Security News
Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News