Tuesday, 02 January 2024 12:17 GMT

November's Top Cyber Attacks: Xworm, Jsguldr, Mobile Threats, And Multi-Stage Campaigns Surge Worldwide


(MENAFN- EIN Presswire) EINPresswire/ -- Cyberattacks continued to intensify in November as attackers relied on multi-stage loaders, in-memory execution, and cross-platform payloads. ANY reports a noticeable rise in loader-driven intrusions, encrypted payload containers, and campaigns targeting Windows, Linux, and Android environments.

The November 2025 Threat Analysis shows how modern attacks blend JavaScript, PowerShell, Linux services, and mobile components to move quietly through enterprise networks, often without leaving traditional executables behind.

PNG-Based In-Memory Loading: XWorm Stealer Returns

A new XWorm wave used phishing pages to deliver an obfuscated JavaScript dropper that hid AES-encrypted payloads inside PNG files. By loading the assembly directly in memory, the malware avoided on-disk artifacts and enabled credential theft and remote access attempts inside corporate environments.

JSGuLdr: Multi-Stage Loader Delivering PhantomStealer

ANY analysts identified JSGuLdr, a multi-stage loader that begins with obfuscated JScript and uses COM to launch PowerShell under explorer, making the activity appear routine. PowerShell then downloads and decrypts a payload from Google Drive and executes it, leading to PhantomStealer being injected into msiexec. This approach enables quiet data theft inside corporate environments with almost no on-disk traces.

For deeper visibility into these threats, including live analyses, key indicators, and detection guidance, explore the ANY blog.

Other Threats Impacting Companies

· RoningLoader, HoldingHands, Snowlight: Cross-platform loader and RAT chain enabling access to both corporate endpoints and Linux servers.

· PDFChampions, Efimer, BTMOB: Browser hijacking, Tor-based credential theft, and Android trojans targeting employee devices and corporate accounts.

· Monkey, Phoenix, NonEuclid: Linux ransomware, targeted Windows backdoors, and hybrid RAT–ransomware used for deeper intrusion into enterprise environments.

· Valkyrie, Sfuzuan, Sorvepotel: Credential theft, adaptable backdoors, and WhatsApp-based malware spreading through trusted communication channels.

About ANY

ANY is a leading provider of interactive malware analysis and threat intelligence solutions used by 15,000 organizations and over 500,000 analysts worldwide. The service combines a live Interactive Sandbox, TI Lookup for instant IOC enrichment, and continuously updated Threat Intelligence Feeds to help security teams investigate faster, improve detection logic, and respond to emerging threats with confidence.

MENAFN01122025003118003196ID1110419484



EIN Presswire

Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.

Search