012 - Decoding XWorm: Command and Control2025-05-02In this article, the last in the XWorm series, we analyze its Command and Control capabilities.Read more →
011 - Decoding XWorm: Communication via Telegram and Retrieval of New Variant2025-04-16In this article, we explore how XWorm reports back to its operators and how it retrieves new variants of itself.Read more →
010 - Decoding XWorm: Keylogger and Cryptocurrency Capture2025-03-19In this article, we explore how XWorm intercepts cryptocurrency transactions intended for other wallets, as well as its ability to capture keystrokes from its victim through keylogging.Read more →
009 - Decoding XWorm: Lateral Movement2025-02-18In this article, we explore how XWorm uses USBs to spread to other machines.Read more →
008 - Decoding XWorm: Defense Evasion and Persistence2025-01-22In this article, we explore how XWorm evades defenses and establish persistence.Read more →