A brand new wave of e-mail assaults is on the rise, tricking folks with pretend bill paperwork to put in the harmful XWorm RAT (Distant Entry Trojan), able to quietly stealing delicate data out of your pc, reveals the most recent analysis from Forcepoint X-Labs.
The rip-off begins with an e-mail, typically pretending to be about “Facturas pendientes de pago” (Pending Invoices for Fee) from somebody named Brezo Sánchez. The e-mail consists of an hooked up Workplace file that has the extension .xlam
.
X-Labs researchers point out that while you open the file, it could look clean or corrupted, however the injury has already began.
Understanding the Assault Chain
As we all know it, cyberattacks usually comply with a sequence of steps, and this one is very detailed. Contained in the hooked up Workplace file is a hidden element referred to as oleObject1.bin
, which comprises an encrypted code, referred to as shellcode. This shellcode is a small program that instantly downloads the following a part of the assault.

The shellcode reaches out to a particular net deal with, hxxp://alpinreisan1com/UXOexe
, to obtain the principle computer virus, an executable file named UXO.exe. This program then begins the second stage- loading one other dangerous DLL file into the pc’s reminiscence (DriverFixPro.dll
).
This loading occurs utilizing reflective DLL injection (a sneaky method to load a dangerous program immediately into the pc’s reminiscence with out saving it as an everyday file first). This DLL finally performs a course of injection, which entails forcing the malicious code to run inside a traditional, innocent program in your pc. This remaining injected code belongs to the XWorm RAT household.
XWorm: A Persistent Menace
Forcepoint’s senior researcher, Prashant Kumar, explains within the weblog publish that XWorm’s capabilities permit it to take full distant management over an contaminated system, from stealing recordsdata to logging keystrokes.
By way of course of injection, the malware runs secretly inside a trusted software and efficiently maintains persistence whereas avoiding detection. Lastly, the XWorm program connects to a Command & Management (C2) server, particularly 158.94.209180
, to ship all of the sufferer’s stolen knowledge to the attackers.
This essential analysis on the multi-stage assault was shared completely with Hackread.com. Nevertheless, it’s price noting that this isn’t the primary time the XWorm menace has been seen this yr.
In January 2025, Hackread.com reported an XWorm marketing campaign that compromised over 18,459 units globally, stealing browser passwords and Discord tokens. Then, in March 2025, Veriti’s analysis revealed that XWorm was utilizing trusted platforms like Amazon Internet Providers (AWS) S3 storage to distribute its dangerous recordsdata.
To guard your self from such assaults, be cautious with attachments, particularly these ending in .xlam
or .bin
, confirm sudden invoices by calling the sender, and usually replace your working system and safety software program.