Malware, Threat Intelligence

XLoader malware deployed via Eclipse jarsigner app

Privacy concept: pixelated words Malware on digital background, 3d render

Threat actors have been leveraging the legitimate Java Archive file signing tool jarsigner created by installing the Eclipse Foundation's IDE package to facilitate the distribution of the XLoader information-stealing malware as part of a new attack campaign, The Hacker News reports.

Intrusions begin with the spread of a compressed ZIP archive containing a renamed jarsigner.exe file, which when executed prompts the loading of a tampered DLL library and eventual injection of XLoader malware, according to an analysis from the AhnLab Security Intelligence Center. Aside from exfiltrating user device and browser details and other sensitive data, XLoader also allows additional malware delivery, said ASEC researchers. Such findings follow a Zscaler ThreatLabz report detailing the emergence of new XLoader malware variants with more advanced obfuscation and encryption capabilities that circumvent signature-based detection systems. "XLoader has introduced techniques that were previously observed in SmokeLoader, including encrypting parts of code at runtime and NTDLL hook evasion," noted Zscaler ThreatLabz researchers.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds