012 - Decoding XWorm: Command and Control 2025-05-02 In this article, the last in the XWorm series, we analyze its Command and Control capabilities. Read more →
011 - Decoding XWorm: Communication via Telegram and Retrieval of New Variant 2025-04-16 In this article, we explore how XWorm reports back to its operators and how it retrieves new variants of itself. Read more →
010 - Decoding XWorm: Keylogger and Cryptocurrency Capture 2025-03-19 In this article, we explore how XWorm intercepts cryptocurrency transactions intended for other wallets, as well as its ability to capture keystrokes from its victim through keylogging. Read more →
009 - Decoding XWorm: Lateral Movement 2025-02-18 In this article, we explore how XWorm uses USBs to spread to other machines. Read more →
008 - Decoding XWorm: Defense Evasion and Persistence 2025-01-22 In this article, we explore how XWorm evades defenses and establish persistence. Read more →