November's Top Cyber Attacks: Xworm, Jsguldr, Mobile Threats, And Multi-Stage Campaigns Surge Worldwide
The November 2025 Threat Analysis shows how modern attacks blend JavaScript, PowerShell, Linux services, and mobile components to move quietly through enterprise networks, often without leaving traditional executables behind.
PNG-Based In-Memory Loading: XWorm Stealer Returns
A new XWorm wave used phishing pages to deliver an obfuscated JavaScript dropper that hid AES-encrypted payloads inside PNG files. By loading the assembly directly in memory, the malware avoided on-disk artifacts and enabled credential theft and remote access attempts inside corporate environments.
JSGuLdr: Multi-Stage Loader Delivering PhantomStealer
ANY analysts identified JSGuLdr, a multi-stage loader that begins with obfuscated JScript and uses COM to launch PowerShell under explorer, making the activity appear routine. PowerShell then downloads and decrypts a payload from Google Drive and executes it, leading to PhantomStealer being injected into msiexec. This approach enables quiet data theft inside corporate environments with almost no on-disk traces.
For deeper visibility into these threats, including live analyses, key indicators, and detection guidance, explore the ANY blog.
Other Threats Impacting Companies
· RoningLoader, HoldingHands, Snowlight: Cross-platform loader and RAT chain enabling access to both corporate endpoints and Linux servers.
· PDFChampions, Efimer, BTMOB: Browser hijacking, Tor-based credential theft, and Android trojans targeting employee devices and corporate accounts.
· Monkey, Phoenix, NonEuclid: Linux ransomware, targeted Windows backdoors, and hybrid RAT–ransomware used for deeper intrusion into enterprise environments.
· Valkyrie, Sfuzuan, Sorvepotel: Credential theft, adaptable backdoors, and WhatsApp-based malware spreading through trusted communication channels.
About ANY
ANY is a leading provider of interactive malware analysis and threat intelligence solutions used by 15,000 organizations and over 500,000 analysts worldwide. The service combines a live Interactive Sandbox, TI Lookup for instant IOC enrichment, and continuously updated Threat Intelligence Feeds to help security teams investigate faster, improve detection logic, and respond to emerging threats with confidence.
Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.

Comments
No comment