Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PlugX USB Worm Exploits DLL Sideloading Globally

PlugX USB Worm Exploits DLL Sideloading Globally

Posted on April 14, 2026 By CWS

A new variant of the PlugX worm is spreading stealthily across continents by embedding itself in USB drives, reaching regions spanning nearly ten time zones. Initially identified in Papua New Guinea in August 2022, it reemerged in January 2023 in both Papua New Guinea and Ghana, which are separated by approximately 10,000 miles. Subsequent infections were reported in Mongolia, Zimbabwe, and Nigeria, marking a significant geographical spread.

Global Spread of PlugX Worm

The PlugX malware is not a new threat; it is a remote access Trojan (RAT) originating from China that has been utilized by cybercriminals for years. This new variant is distinguished by a novel payload and its connection to a command-and-control (C2) server previously not closely associated with this malware family. The worm employs DLL sideloading, a method that coerces a legitimate application into loading a malicious library, allowing the malware to execute its code without immediate detection.

Technical Analysis and Infection Mechanism

Researchers from Sophos X-Ops, led by analyst Gabor Szappanos, uncovered this variant following a CryptoGuard alert, likely triggered by a data theft attempt. The infection package comprises a legitimate AvastSvc.exe executable, vulnerable to DLL sideloading, a malicious DLL called wsc.dll, and an encrypted payload file. These components collaborate to discreetly operate the PlugX backdoor on compromised systems.

The C2 activity was traced to IP address 45.142.166[.]112, previously mentioned in a 2019 report by Unit 42 as loosely connected to PlugX but not directly linked to any known threat actor. Sophos researchers now assert that the tactics used are consistent with those of PKPLUG, also known as Mustang Panda, a China-linked advanced persistent threat (APT) group.

Preventive Measures Against USB-Based Malware

The PlugX variant uses deception as its core infection strategy. When the worm copies itself onto a USB drive, it utilizes specific mutex strings, USB_NOTIFY_COP and USB_NOTIFY_INF, to manage the operation. Once transferred, the USB drive appears empty in a standard Windows Explorer view, masking the presence of a shortcut file designed to resemble another removable disk.

Clicking the shortcut silently executes the CEFHelper executable, a renamed AvastSvc.exe file, disguised to resemble a legitimate Adobe process. Other malicious files and directories are hidden by default in file listings. The worm stores its components within a directory named RECYCLER.BIN, using a desktop.ini file to mimic a genuine Recycle Bin, further concealing its activities.

Organizations should view USB connections as potential security threats, especially in environments handling sensitive information. Disabling AutoRun and AutoPlay for all removable media is a straightforward yet effective preventive measure. IT departments should also configure systems to display hidden and system files by default, which can help detect suspicious directories like RECYCLER.BIN. Regularly monitoring outbound C2 traffic and using endpoint protection that detects DLL sideloading activities are crucial steps for any organization confronting this targeted threat.

For more updates, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google.

Cyber Security News Tags:APT group, Cybersecurity, DLL Sideloading, Malware, Mustang Panda, PKPLUG, PlugX, remote access trojan, Sophos, USB worm

Post navigation

Previous Post: AI Threats Loom: CISOs Urged to Strengthen Cybersecurity
Next Post: Data Breach Affects 1 Million Members at Europe’s Top Gym

Related Posts

North Korean Hackers Exploit Novel Malware for Air-Gapped Systems North Korean Hackers Exploit Novel Malware for Air-Gapped Systems Cyber Security News
Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks Cyber Security News
Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access Cyber Security News
Google Finalizes Historic  Billion Wiz Acquisition Google Finalizes Historic $32 Billion Wiz Acquisition Cyber Security News
New Tool Exploits Windows Service Recovery for Cyber Attacks New Tool Exploits Windows Service Recovery for Cyber Attacks Cyber Security News
Cloudflare Confirms Recent 1.1.1.1 DNS Outage Caused by BGP Attack or Hijack Cloudflare Confirms Recent 1.1.1.1 DNS Outage Caused by BGP Attack or Hijack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws
  • Earn CPE Credits with SRA’s Purple Team Exercises
  • Critical PHP Composer Vulnerabilities Patched
  • Critical Vulnerability in etcd Allows Unauthorized API Access
  • Adobe Fixes 55 Security Flaws in Multiple Products

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws
  • Earn CPE Credits with SRA’s Purple Team Exercises
  • Critical PHP Composer Vulnerabilities Patched
  • Critical Vulnerability in etcd Allows Unauthorized API Access
  • Adobe Fixes 55 Security Flaws in Multiple Products

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark