Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

AES Encryption Shields Malicious Payloads

March 4, 2025
Reading Time: 3 mins read
in Alerts

Cybersecurity researchers have uncovered an alarming increase in the use of AES (Advanced Encryption Standard) encryption by threat actors, who employ it to conceal malicious payloads and evade detection. This encryption method, when combined with other advanced techniques like code virtualization and staged payload delivery, is being adopted by malware families such as Agent Tesla, XWorm, and FormBook/XLoader to bypass traditional static analysis tools and sandbox environments. These multi-layered evasion tactics significantly complicate the detection process, as they allow the malicious payloads to remain hidden during the analysis and prevent security tools from identifying their presence. This trend underscores the growing sophistication of cybercriminal operations and highlights the need for security solutions to evolve in response.

AES encryption plays a pivotal role in these advanced malware campaigns.

As a symmetric block cipher, AES transforms plaintext into ciphertext through several rounds of substitution and permutation. In the observed attacks, AES operates in Cipher Block Chaining (CBC) mode, ensuring that each block of plaintext is encrypted with a unique initialization vector (IV), making decryption efforts far more difficult. The encrypted payloads are typically embedded within the Portable Executable (PE) overlay, a part of the file that is often overlooked by conventional static analysis tools. To further complicate detection, the cryptographic parameters—such as the AES key and IV—are hidden within the overlay, padded with arbitrary data to avoid signature-based detection mechanisms.

Once the payload is decrypted, the malware proceeds to the next phase of its evasion strategy: code virtualization.

This technique, facilitated by tools like KoiVM, transforms the malware’s standard code into a proprietary intermediate language that can only be executed by a custom virtual machine (VM). The VM’s dispatcher routes the instructions to specialized handlers, making reverse engineering of the malware extremely challenging. As a result, even if analysts manage to analyze the decrypted payload, the use of a custom VM makes it almost impossible to reconstruct the original malicious code. The second-stage payload acts as a dropper, loading the final malicious code directly into memory and bypassing traditional file-based detection methods entirely.

The final stage of this multi-layered attack is the execution of the payload in memory, which allows the malware to bypass the common file-scanning methods used by most security tools. Once the payload is loaded into memory, it can begin executing its harmful actions without ever being written to disk, avoiding detection by conventional antivirus software. In some cases, malware families like XWorm go further by encrypting their configuration data with AES in Electronic Codebook (ECB) mode, adding another layer of encryption to prevent analysis. The use of these multi-staged techniques, such as .NET reflection to manipulate objects at runtime, further complicates traditional detection approaches. This evolution in malware techniques requires a shift in how cybersecurity solutions approach threat detection, emphasizing the importance of behavioral analytics and machine learning to spot anomalies during runtime. By focusing on the execution and behavior of malware in real-time, security vendors can more effectively counter these complex attacks before they can cause significant damage.

Reference:
  • Researchers Find Surge in AES Encryption Use by Threat Actors to Evade Detection
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

FIN6 Uses Fake Resumes To Hack Recruiters

FIN6 Uses Fake Resumes To Hack Recruiters

June 11, 2025
Microsoft Fixes Exploited WebDAV Zero Day

Microsoft Fixes Exploited WebDAV Zero Day

June 11, 2025
Fake Sora AI Lure Installs Infostealer

Fake Sora AI Lure Installs Infostealer

June 11, 2025
New Skitnet Malware Arms Ransomware Gangs

Google Bug Exposed Any User’s Phone Number

June 10, 2025
New Skitnet Malware Arms Ransomware Gangs

Roundcube RCE Flaw Risks 84,000 Servers

June 10, 2025
New Skitnet Malware Arms Ransomware Gangs

New Skitnet Malware Arms Ransomware Gangs

June 10, 2025

Latest Alerts

Fake Sora AI Lure Installs Infostealer

FIN6 Uses Fake Resumes To Hack Recruiters

Microsoft Fixes Exploited WebDAV Zero Day

Google Bug Exposed Any User’s Phone Number

Roundcube RCE Flaw Risks 84,000 Servers

New Skitnet Malware Arms Ransomware Gangs

Subscribe to our newsletter

    Latest Incidents

    BHA Hit By Ransomware But Races Continue

    Sompo Data Breach Puts 17.5M Records At Risk

    DDoS Disrupts Roularta Media In Belgium

    Texas DOT Breach Leaks 300K Crash Reports

    Illinois HFS Employee Phishing Leaks Data

    Cyberattack Disrupts UNFI Food Deliveries

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial