There were 1,399 press releases posted in the last 24 hours and 358,360 in the last 365 days.

Novemberโ€™s Top Cyber Attacks: XWorm, JSGuLdr, Mobile Threats, and Multi-Stage Campaigns Surge Worldwide

DUBAI, DUBAI, UNITED ARAB EMIRATES, December 1, 2025 /EINPresswire.com/ -- Cyberattacks continued to intensify in November as attackers relied on multi-stage loaders, in-memory execution, and cross-platform payloads. ANY.RUN reports a noticeable rise in loader-driven intrusions, encrypted payload containers, and campaigns targeting Windows, Linux, and Android environments.

The November 2025 Threat Analysis shows how modern attacks blend JavaScript, PowerShell, Linux services, and mobile components to move quietly through enterprise networks, often without leaving traditional executables behind.

๐๐๐†-๐๐š๐ฌ๐ž๐ ๐ˆ๐ง-๐Œ๐ž๐ฆ๐จ๐ซ๐ฒ ๐‹๐จ๐š๐๐ข๐ง๐ : ๐—๐–๐จ๐ซ๐ฆ ๐’๐ญ๐ž๐š๐ฅ๐ž๐ซ ๐‘๐ž๐ญ๐ฎ๐ซ๐ง๐ฌ

A new XWorm wave used phishing pages to deliver an obfuscated JavaScript dropper that hid AES-encrypted payloads inside PNG files. By loading the .NET assembly directly in memory, the malware avoided on-disk artifacts and enabled credential theft and remote access attempts inside corporate environments.

๐‰๐’๐†๐ฎ๐‹๐๐ซ: ๐Œ๐ฎ๐ฅ๐ญ๐ข-๐’๐ญ๐š๐ ๐ž ๐‹๐จ๐š๐๐ž๐ซ ๐ƒ๐ž๐ฅ๐ข๐ฏ๐ž๐ซ๐ข๐ง๐  ๐๐ก๐š๐ง๐ญ๐จ๐ฆ๐’๐ญ๐ž๐š๐ฅ๐ž๐ซ

ANY.RUN analysts identified JSGuLdr, a multi-stage loader that begins with obfuscated JScript and uses COM to launch PowerShell under explorer.exe, making the activity appear routine. PowerShell then downloads and decrypts a payload from Google Drive and executes it, leading to PhantomStealer being injected into msiexec.exe. This approach enables quiet data theft inside corporate environments with almost no on-disk traces.

For deeper visibility into these threats, including live analyses, key indicators, and detection guidance, explore the ANY.RUN blog.

๐Ž๐ญ๐ก๐ž๐ซ ๐“๐ก๐ซ๐ž๐š๐ญ๐ฌ ๐ˆ๐ฆ๐ฉ๐š๐œ๐ญ๐ข๐ง๐  ๐‚๐จ๐ฆ๐ฉ๐š๐ง๐ข๐ž๐ฌ

ยท ๐—ฅ๐—ผ๐—ป๐—ถ๐—ป๐—ด๐—Ÿ๐—ผ๐—ฎ๐—ฑ๐—ฒ๐—ฟ, ๐—›๐—ผ๐—น๐—ฑ๐—ถ๐—ป๐—ด๐—›๐—ฎ๐—ป๐—ฑ๐˜€, ๐—ฆ๐—ป๐—ผ๐˜„๐—น๐—ถ๐—ด๐—ต๐˜: Cross-platform loader and RAT chain enabling access to both corporate endpoints and Linux servers.

ยท ๐—ฃ๐——๐—™๐—–๐—ต๐—ฎ๐—บ๐—ฝ๐—ถ๐—ผ๐—ป๐˜€, ๐—˜๐—ณ๐—ถ๐—บ๐—ฒ๐—ฟ, ๐—•๐—ง๐— ๐—ข๐—•: Browser hijacking, Tor-based credential theft, and Android trojans targeting employee devices and corporate accounts.

ยท ๐— ๐—ผ๐—ป๐—ธ๐—ฒ๐˜†, ๐—ฃ๐—ต๐—ผ๐—ฒ๐—ป๐—ถ๐˜…, ๐—ก๐—ผ๐—ป๐—˜๐˜‚๐—ฐ๐—น๐—ถ๐—ฑ: Linux ransomware, targeted Windows backdoors, and hybrid RATโ€“ransomware used for deeper intrusion into enterprise environments.

ยท ๐•๐š๐ฅ๐ค๐ฒ๐ซ๐ข๐ž, ๐’๐Ÿ๐ฎ๐ณ๐ฎ๐š๐ง, ๐’๐จ๐ซ๐ฏ๐ž๐ฉ๐จ๐ญ๐ž๐ฅ: Credential theft, adaptable backdoors, and WhatsApp-based malware spreading through trusted communication channels.

๐€๐›๐จ๐ฎ๐ญ ๐€๐๐˜.๐‘๐”๐

ANY.RUN is a leading provider of interactive malware analysis and threat intelligence solutions used by 15,000 organizations and over 500,000 analysts worldwide. The service combines a live Interactive Sandbox, TI Lookup for instant IOC enrichment, and continuously updated Threat Intelligence Feeds to help security teams investigate faster, improve detection logic, and respond to emerging threats with confidence.

The ANY.RUN team
ANYRUN FZCO
+1 657-366-5050
email us here
Visit us on social media:
LinkedIn
YouTube
X

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.