Identity

HijackLoader, CoreWarrior, XWorm malware strains leveraged in attacks

Share
Twofactor authentication represented by a digital key and smartphone, cybersecurity, blue tones, 3D rendering

Malicious payloads HijackLoader, CoreWarrior, and XWorm have been deployed in separate malware attack campaigns, The Hacker News reports.

Authentic code-signing certificates have been leveraged by threat actors to facilitate the HijackLoader malware campaign earlier this month to better conceal the deployment of the Lumma information-stealing malware, an analysis from HarfangLab showed. "This research underscores that malware can be signed, highlighting that code signature alone cannot serve as a baseline indicator of trustworthiness," said HarfangLab researchers. Another report from SonicWall Capture Labs noted mounting Windows system-targeted attacks involving the CoreWarrior trojan, which establishes communications with various IP addresses and ensures backdoor access through multiple sockets. Threat actors were also reported by Netskope Threat Labs to have exploited a Windows Script File to deliver the XWorm infostealer and loader malware, which not only conducts screenshot capturing and host file reading and modification but also allows denial-of-service intrusions while eradicating stored plugins to ensure stealth.

An In-Depth Guide to Identity

Get essential knowledge and practical strategies to fortify your identity security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.