Weaponized XWorm RAT Builder Targeting Script Kiddies to Extract Sensitive Data

In a recent cybersecurity breach, a modified version of the XWorm Remote Access Trojan (RAT) builder has been weaponized and used to target inexperienced cybersecurity enthusiasts, resulting in the compromise of over 18,000 devices worldwide.

Propagated primarily through GitHub, Telegram channels, and file-sharing platforms, the trojanized RAT builder has stolen sensitive data spanning browser credentials, system information, and tokens from applications like Discord and Telegram, while also granting attackers absolute control over infected systems.

Sophisticated Malware Delivery

The trojanized XWorm RAT builder has been distributed through several pathways, including GitHub repositories, file-sharing links, and Telegram forums.

Novice users referred to as “script kiddies” were lured by the tool under the guise of helpful tutorials and tools for penetration testing.

Upon execution, the malware leverages advanced techniques, including registry modifications and virtualization checks, to avoid detection and ensure persistence.

XWorm RAT Builder
Country wise breakdown of the victims of the malware

The malware communicates with attackers via a Telegram-based command-and-control (C&C) system.

Hardcoded bot tokens allow the RAT to exfiltrate stolen data, such as browser credentials, Telegram data, and Discord tokens, while also enabling live interaction with infected devices.

To date, over 1 GB of browser credentials has been exfiltrated, with victims spanning countries such as Russia, the United States, India, Ukraine, and Turkey.

Notably, the malware employs the Telegram API for issuing commands, such as retrieving browser history, taking screenshots, capturing user data, and executing commands on victim machines.

According to the CloudSek, the RAT also contains self-propagation mechanisms, modifying registry keys to ensure execution at system startup and targeting offline devices during subsequent infection waves.

Discovery of a Kill Switch

Researchers analyzing the malware’s operation and infrastructure uncovered a built-in “kill switch” that could disrupt its activities.

By exploiting the Telegram-based uninstall command, the researchers initiated efforts to terminate infections on active devices.

This command allowed them to remotely remove the RAT from compromised systems, but the approach faced limitations such as Telegram’s rate-limiting and offline infected devices.

XWorm RAT Builder
Screenshot taken from one of the infected devices

In addition to disruption, attribution efforts linked the operation to aliases like “@shinyenigma” and “@milleniumrat” on GitHub and Telegram, as well as a ProtonMail address.

Testing infrastructure associated with the threat actors included an AWS-hosted RDP file, suggesting their use of cloud-based environments during development and testing.

To counter such advanced threats, cybersecurity professionals recommend several strategies, including deploying Endpoint Detection and Response (EDR) solutions, monitoring for Indicators of Compromise (IoCs), and enhancing employee awareness of phishing and fake RAT tools.

Network administrators should also block access to malicious GitHub repositories and Telegram channels while enforcing strict application whitelisting policies.

Organizations are urged to collaborate with law enforcement and platform providers like Telegram and GitHub to dismantle malicious infrastructure and hold perpetrators accountable.

By leveraging proactive threat intelligence and maintaining robust cybersecurity hygiene, organizations can mitigate risks posed by evolving malware such as the trojanized XWorm RAT.

Also Read:

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here