Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

XWorm 6.0 Returns With New Plugins

October 7, 2025
Reading Time: 3 mins read
in Alerts
XWorm 6.0 Returns With New Plugins

Since its emergence in 2022, XWorm, a powerful piece of malware developed by the threat actor EvilCoder, has evolved into a highly versatile and modular tool. It’s often distributed through phishing emails and bogus websites that trick users into downloading malicious files. The malware is designed with a core client and a variety of specialized components, or “plugins,” that allow it to perform a broad spectrum of harmful actions. These actions include stealing data, recording keystrokes, capturing screenshots, and even deploying ransomware. Despite some past setbacks, including a period of apparent dormancy, XWorm has made a powerful return, highlighting the persistent and adaptable nature of modern cyber threats.

The key to XWorm’s potency is its modular design. The core malware client can download and execute a range of plugins from a command-and-control (C2) server, allowing an attacker to customize the malware’s functionality on the fly. This architecture allows XWorm to evade detection and analysis by checking for signs of a virtualized environment before executing its full payload. The latest version, XWorm 6.0, supports over 35 different plugins, each designed for a specific purpose. These plugins include tools for accessing and manipulating filesystems, executing system commands, gathering information on the victim’s machine, and even creating a remote desktop session. This adaptability makes it a “Swiss Army knife” of malware, capable of fitting into almost any attack scenario.

XWorm has been observed using various tactics to infect systems and avoid detection. A common infection method involves malicious JavaScript files sent via phishing emails. When a user opens the file, it displays a decoy PDF document while silently executing PowerShell code in the background. This code then injects the XWorm malware into a legitimate Windows process, like RegSvcs.exe, to remain hidden. The malware also incorporates anti-analysis and anti-evasion mechanisms, which check for tell-tale signs of a virtualized environment and cease execution if detected. This multi-layered approach to infection and evasion makes XWorm a particularly difficult threat to defend against.

After an abrupt and unexpected shutdown by its developer, a new version of the malware, XWorm 6.0, was offered for sale on cybercrime forums. This new version, described as “fully re-coded,” boasts a wider array of plugins and a fix for a previously discovered vulnerability. The return of XWorm with this new, more powerful version illustrates a trend in the cybercriminal underground: when a popular tool disappears, it often re-emerges under new management or a new version. The developers of XWorm 6.0, and those distributing it, have also been observed to be a part of a vicious cycle, where a cracked version of the software itself contains malware, infecting other threat actors who download it.

In addition to its own plugins, XWorm 6.0 has been used to distribute other malware families, including various stealers, keyloggers, and remote access trojans. These secondary infections demonstrate how XWorm serves as a gateway for other malicious activities, extending the reach and impact of an initial attack. The re-emergence of XWorm, armed with a versatile array of plugins for everything from credential theft to ransomware, serves as a powerful reminder that no malware threat is ever truly gone. It emphasizes the critical importance of a robust cybersecurity posture and highlights the constant need for vigilance against evolving and persistent threats.

Reference:

  • XWorm 6.0 Returns With Over 35 Plugins And Stronger Data Theft Capabilities
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

XWorm 6.0 Returns With New Plugins

Rhadamanthys Stealer Evolves Again

October 7, 2025
XWorm 6.0 Returns With New Plugins

Steam And Microsoft Warn Of Unity Flaw

October 7, 2025
CISA Adds New Flaws to KEV Catalog

Oracle Issues Security Alert

October 6, 2025
CISA Adds New Flaws to KEV Catalog

CISA Adds New Flaws to KEV Catalog

October 6, 2025
CISA Adds New Flaws to KEV Catalog

Hackers Exploit Zimbra Zero Day Flaw

October 6, 2025
Facebook Scams Target Seniors With Malware

Android Spyware Poses As Signal And Totok

October 3, 2025

Latest Alerts

XWorm 6.0 Returns With New Plugins

Steam And Microsoft Warn Of Unity Flaw

Rhadamanthys Stealer Evolves Again

Oracle Issues Security Alert

Hackers Exploit Zimbra Zero Day Flaw

CISA Adds New Flaws to KEV Catalog

Subscribe to our newsletter

    Latest Incidents

    Red Hat Data Breach Escalates Further

    FC Barcelona Instagram Hacked By Scam

    Threat Actors Claim Huawei Breach

    Discord Reveals Data Breach Incident

    Abracadabra Hit by Third DeFi Hack

    Extortion Group Launches Salesforce Data Leak

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial