Monday, April 28, 2025
Homecyber securityWeaponised XWorm RAT Builder Attacking Script Kiddies To Hack 18,000 Devices

Weaponised XWorm RAT Builder Attacking Script Kiddies To Hack 18,000 Devices

Published on

SIEM as a Service

Follow Us on Google News

A recent cybersecurity attack involving a Trojanized version of the XWorm Remote Access Trojan (RAT) builder has compromised over 18,000 devices worldwide.

This sophisticated malware, primarily distributed via GitHub repositories, Telegram channels, and other platforms, has targeted cybersecurity novices, also known as “script kiddies,” who unknowingly downloaded malicious tools.

Trojanized XWorm RAT Builder Exploits Over 18,000 Devices Globally

The malware has infiltrated devices in Russia, the United States, India, Ukraine, and Turkey, with the primary goal of exfiltrating sensitive data and maintaining long-term control over infected machines.

- Advertisement - Google News

Using Telegram as its command-and-control (C&C) infrastructure, the malware provides attackers with the ability to exfiltrate browser credentials, Discord tokens, system information, and more.

Weaponised XWorm RAT
Telegram channel milleniumrat

In addition, it employs advanced virtualization checks to evade detection in virtualized environments and manipulates Windows Registry entries for persistence.

Its capabilities extend to issuing malicious commands, including encrypting files, stealing data, and even invoking a “Blue Screen of Death” (BSOD) on victim systems.

Disruption Efforts Leverage Malware’s Own Kill Switch

Researchers investigating the malware successfully leveraged its built-in uninstall command to neutralize the botnet controlling thousands of infected machines.

By exploiting Telegram communications, they sent uninstall commands en masse to active devices.

However, this approach was constrained by certain limitations, including offline machines and Telegram’s rate-limiting functionalities.

Machines not online at the time of the command burst remain infected, highlighting the challenges in fully eradicating such a widespread malware campaign.

The malware’s architecture revealed hardcoded Telegram bot IDs and tokens, which were instrumental in its operation.

Weaponised XWorm RAT
Threat actor uploading the chk1.rdp file on an infected device

Data analysis showed that over 1 GB of browser credentials and thousands of screenshots and Discord tokens had been exfiltrated.

Attribution efforts traced the threat actors to aliases such as “@shinyenigma” and “@milleniumrat,” linked to GitHub accounts and a ProtonMail address.

Experts at CloudSek emphasize the importance of proactive defense measures to mitigate future attacks of this scale.

Deploying Endpoint Detection and Response (EDR) solutions and monitoring network traffic for communication with malicious C&C servers are critical first steps.

Organizations are also advised to block known Indicators of Compromise (IoCs), such as infected GitHub repositories and Telegram channels, while enforcing stricter application whitelisting policies.

Educating employees about the risks of unauthorized downloads and malicious tools is another vital mitigation strategy.

Additionally, removing persistent malware requires deep system scans alongside manual cleanup of registry entries and startup scripts.

Collaborative efforts with law enforcement and platform providers like GitHub and Telegram are essential to dismantling malicious infrastructure and holding threat actors accountable.

The Trojanized XWorm RAT builder demonstrates the escalating sophistication of modern malware campaigns, emphasizing the need for continuous vigilance, advanced cybersecurity tools, and proactive education.

By targeting inexperienced users with malicious tools disguised as helpful utilities, attackers capitalized on trust to initiate widespread breaches.

Moving forward, concerted efforts in threat intelligence sharing, rapid response, and robust system security will be paramount in combating such advanced threats.

Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...