XWorm 7.1 und Remcos RAT: Angreifer setzen auf dateilose Techniken und Windows-Bordmittel
Beide Schadprogramme nutzen vertrauenswürdige Windows-Systemwerkzeuge, um gängigen Sicherheitslösungen zu entgehen – ein Ansatz, der unter dem Begriff „Living off the Land“ bekannt ist und zunehmend auch bei kommerziell vertriebener Malware zum Einsatz kommt.
https://www.all-about-security.de/xworm-7-1-und-remcos-rat-angreifer-setzen-auf-dateilose-techniken-und-windows-bordmittel/
#winrar #Livingofftheland #malware #cybersecurity #maas

XWorm 7.1 und Remcos RAT: Methoden der Angreifer
Entdecken Sie die Gefahren von XWorm 7.1 und Remcos RAT: wie Angreifer Windows-Tools zur Tarnung nutzen.
All About Security Das Online-Magazin zu Cybersecurity (Cybersicherheit). Ransomware, Phishing, IT-Sicherheit, Netzwerksicherheit, KI, Threats, DDoS, Identity & Access, PlattformsicherheitNew XWorm 7.1 and Remcos RAT campaigns are abusing trusted #Windows utilities and memory-based execution to evade detection, giving attackers remote access to infected systems. The campaign also exploits a #WinRAR vulnerability to gain initial access.
Read: https://hackread.com/xworm-7-1-remcos-rat-windows-tools-evade-detection/
#CyberSecurity #Malware #XWorm #RemcosRAT

XWorm 7.1 and Remcos RAT Attacks Abuse Windows Tools to Evade Detection
New XWorm 7.1 and Remcos RAT campaigns abuse trusted Windows tools to evade detection. The attacks exploit a WinRAR flaw and use process hollowing to spy on victims.
Hackread - Cybersecurity News, Data Breaches, AI and MoreZIP 壓縮機制大漏洞 全部防毒軟件中招 黑客可藏惡意程式碼 - unwire.hk 香港
網絡安全公司 Bombadil Systems 研究員 Chris Aziz 發現 ZIP 壓縮檔存在嚴重漏洞「Zombie ZIP」。黑客惡意篡改檔案標頭,令 VirusTotal 平台 50 款防毒引擎無法偵測惡意程式碼。用家使用 WinRAR 或 7-Zip 等解壓工具打開檔案並點擊執行,即讓黑客取得系統控制權。
香港 unwire.hk 玩生活.樂科技ZIP 壓縮機制大漏洞 全部防毒軟件中招 黑客可藏惡意程式碼 - unwire.hk 香港
網絡安全公司 Bombadil Systems 研究員 Chris Aziz 發現 ZIP 壓縮檔存在嚴重漏洞「Zombie ZIP」。黑客惡意篡改檔案標頭,令 VirusTotal 平台 50 款防毒引擎無法偵測惡意程式碼。用家使用 WinRAR 或 7-Zip 等解壓工具打開檔案並點擊執行,即讓黑客取得系統控制權。
香港 unwire.hk 玩生活.樂科技#CheckPoint Research observed #Amaranth-Dragon, a Chinese-aligned group linked to #APT41, conducting espionage against government and law enforcement across Southeast Asia. The threat actor weaponized #WinRAR flaw CVE-2025-8088 within 10 days after its disclosure, geo-fenced servers to targets, and introduced #TGAmaranth, a Telegram-based remote access tool.
https://research.checkpoint.com/2026/amaranth-dragon-weaponizes-cve-2025-8088-for-targeted-espionage/

Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia - Check Point Research
Key Points Introduction Check Point Research has identified several campaigns targeting multiple countries in the Southeast Asian region. These related activities have been collectively categorized under the codename “Amaranth-Dragon”. The campaigns demonstrate a clear focus on government entities across the region, suggesting a motivated threat actor with a strong interest in geopolitical intelligence. The campaigns […]
Check Point Research