Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
XWorm RAT Campaign Evades Detection with Excel Exploit

XWorm RAT Campaign Evades Detection with Excel Exploit

Posted on February 13, 2026 By CWS

In a recent cybersecurity alert, experts have identified a phishing campaign that deploys an updated version of the XWorm Remote Access Trojan (RAT). This malware grants cybercriminals comprehensive control over infected Microsoft Windows systems, posing significant risks to users.

Background on XWorm RAT

First tracked in 2022, XWorm remains a prevalent threat within the digital security landscape. It is commonly circulated via Telegram-based marketplaces, making it easily accessible to a wide range of threat actors. Its persistent use underscores the need for continuous vigilance against such cyber threats.

The latest campaign employs a variety of business-themed emails, such as those related to payment verifications and shipment confirmations, to lure recipients into opening a harmful Excel add-in file (.XLAM). This tactic effectively initiates a rapid transition from document execution to the delivery of malware directly into the system’s memory.

Technical Breakdown of the Attack

The campaign was uncovered by Fortinet researchers, who detailed how the malicious Excel file exploits the CVE-2018-0802 vulnerability. This flaw in Microsoft’s Equation Editor allows remote code execution, providing a pathway for attackers to inject harmful code into a system.

Once activated, the exploit downloads an HTA file from a specified URL and executes it using ShellExecuteExW. This transition helps the malicious operation remain inconspicuous, as it mimics typical Windows processes while the harmful payload is prepared.

Payload Execution and Defense

Subsequently, the obfuscated HTA file, executed under mshta.exe, deploys a Base64-encoded PowerShell payload. This payload retrieves a hidden .NET module from an image file hosted online. The module, cleverly disguised with the assembly name Microsoft.Win32.TaskScheduler, operates in memory, making detection more challenging.

The final step involves the .NET loader decrypting and executing the XWorm payload by using process hollowing to inject it into Msbuild.exe. The RAT then communicates with a command-and-control server using encrypted traffic. To counter this, cybersecurity professionals advise patching the Equation Editor vulnerability, restricting .XLAM and HTA execution paths, and implementing strict controls on mshta.exe, PowerShell, and Msbuild.exe activities.

As cyber threats evolve, staying informed and implementing robust security measures are crucial. Follow us for more updates on emerging cyber threats and defenses.

Cyber Security News Tags:CVE-2018-0802, Cybersecurity, Excel exploit, Fortinet, Malware, Phishing, PowerShell, RAT, remote access trojan, Windows, XWorm

Post navigation

Previous Post: UAT-9921 Targets Tech and Finance with VoidLink Malware
Next Post: Russian Group Linked to Malware Attacks on Ukraine

Related Posts

FortiWeb Authentication Bypass Vulnerability Exploited FortiWeb Authentication Bypass Vulnerability Exploited Cyber Security News
Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered Cyber Security News
OpenAnt: AI Tool for Detecting Software Vulnerabilities OpenAnt: AI Tool for Detecting Software Vulnerabilities Cyber Security News
Admin Behind LeakBase Hacker Forum Arrested in Russia Admin Behind LeakBase Hacker Forum Arrested in Russia Cyber Security News
Cyberattack Hits European Commission’s AWS Account Cyberattack Hits European Commission’s AWS Account Cyber Security News
TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in Open VSX Exposes Users to Risk
  • TA446 Hackers Unleash DarkSword Kit on iOS Devices
  • Rundll32 and WebDAV: New ClickFix Variant Evades Detection
  • OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability
  • Top AWS Monitoring Tools for Optimal Cloud Performance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in Open VSX Exposes Users to Risk
  • TA446 Hackers Unleash DarkSword Kit on iOS Devices
  • Rundll32 and WebDAV: New ClickFix Variant Evades Detection
  • OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability
  • Top AWS Monitoring Tools for Optimal Cloud Performance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark