msbuild (2)

31087899263?profile=RESIZE_400xRecently observed a phishing campaign in the wild that delivers a new variant of XWorm.

XWorm is a multi-functional Remote Access Trojan (RAT) first identified in 2022 that remains actively distributed, including through Telegram-based marketplaces.  Once deployed, it provides attackers with full remote control of compromised Windows systems.  This campaign relies on multiple phishing emails that employ social engineering to trick recipients into opening a malicious attachment.  The following an

31053915075?profile=RESIZE_400xSecuronix threat researchers have been tracking a stealthy campaign targeting the hospitality sector that uses click-fix social engineering, fake captchas, and fake blue screens of death to trick users into pasting malicious code.  It leverages a trusted MSBuid.exe tool to bypass defenses and deploys a stealthy, Russian-linked DCRat payload for full remote access and the ability to drop secondary payloads.[1]

An ongoing malware campaign tracked as PHALT#BLYX has been identified as a multi-stage