Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Top 5 malware threats to prepare for in 2025
Global Security

Top 5 malware threats to prepare for in 2025

AdminBy AdminJanuary 8, 2025No Comments7 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


2024 saw many high-profile cyber attacks, with major companies such as Dell and TicketMaster falling victim to data breaches and other infrastructure breaches. In 2025, this trend will continue. Therefore, to be prepared for any malware attacks, every organization must know their cyber enemy in advance. Here are 5 common malware families you can start preparing against right now.

Lamma

Lumma is a widely available malware designed to steal sensitive information. It has been openly sold on the Dark Web since 2022. This malware can effectively collect and extract data from targeted applications, including login credentials, financial information, and personal data.

Lumma is regularly updated to expand its capabilities. It can record detailed information from compromised systems, such as browsing history and cryptocurrency wallet data. It can be used to install other malware on infected devices. In 2024, Lumma was distributed using various methods, including fake CAPTCHA pages, torrents, and targeted phishing emails.

Lumma Attack Analysis

Preventive analysis of suspicious files and URLs in the sandbox can effectively help you prevent Lumma infection.

Let’s see how you can do it with help Cloud sandbox ANY.RUN. Not only does it deliver final verdicts on malware and phishing along with effective indicators, it also allows you to interact with the threat and system in real-time.

Take a look at this analysis Lumma attacks.

ANY.RUN allows you to manually open files and run executables

It starts with an archive containing an executable file. After running the .exe file, the sandbox automatically logs all processes and network activity, showing Lumma activities.

Suricata IDS informs us of a malicious connection to the C2 Lumma server

It connects to its management server (C2).

A malicious process responsible for stealing data from the system

It then starts collecting and deleting data from the machine.

You can use sandboxed IOCs to improve your detection systems

Once the analysis is complete, we can export a report on this sample with all Critical Indicators of Comprehension (IOC) and TTP that can be used to enhance your organization’s defenses against potential Lumma attacks.

Try all features of ANY.RUN interactive sandbox for free with a 14-day trial

XWorm

XWorm is a malware that gives cybercriminals remote control over infected computers. First appearing in July 2022, it can collect a wide range of sensitive information, including financial information, browsing history, saved passwords and cryptocurrency wallet data.

XWorm allows attackers to monitor a victim’s activities by tracking keystrokes, recording webcam images, listening to audio, scanning network connections, and viewing open windows. It can also access and manipulate a computer’s clipboard, potentially stealing cryptocurrency wallet credentials.

In 2024, XWorm was involved in many large-scale attacks, including those using CloudFlare tunnels and legitimate digital certificates.

XWorm Attack Analysis

Phishing emails are often the initial stage of XWorm attacks

U this attackwe see the original phishing email with a link to Google Drive.

A Google Drive page with a link to download a malicious archive

After clicking on the link, we are offered to download a password-protected archive.

A malicious archive with a .vbs file was opened

You can find the password in the email. After entering it, we can access the .vbs script in the .zip file.

XWorm uses MSBuild.exe to persist to the system

As soon as we run the script, the sandbox instantly detects malicious activities that eventually lead to the deployment of XWorm on the machine.

AsyncRAT

AsyncRAT is another remote access Trojan on the list. First spotted in 2019, it initially spread through spam, often using the COVID-19 pandemic as bait. Since then, the malware has gained popularity and has been used in various cyber attacks.

AsyncRAT has evolved over time to include a wide range of malicious capabilities. It can secretly record the victim’s screen actions, log keystrokes, install additional malware, steal files, maintain a constant presence on infected systems, disable security software, and launch attacks that block targeted websites.

In 2024, AsyncRAT remained a significant threat, often disguised as pirated software. It was also one of the first malware families to be distributed as part of sophisticated attacks using AI-generated scripts.

Analysis of the AsyncRAT attack

Initial archive with .exe file

U this analysis sessionwe see another archive with a malicious executable inside.

The PowerShell process used to download the payload

Exploding the file starts the XWorm execution chain, which involves using PowerShell scripts to retrieve additional files needed to facilitate the infection.

After the analysis is complete, the sandbox displays the final verdict on the sample.

Remkos

Remcos is malware that was marketed by its creators as a legitimate remote access tool. Since its launch in 2019, it has been used in numerous attacks to perform a wide range of malicious activities, including stealing sensitive information, remote system control, keystroke logging, screen capture, etc.

In 2024, Remcos distribution campaigns used techniques such as script-based attacks, often starting with VBScript that runs a PowerShell script to deploy the malware, and exploited vulnerabilities such as CVE-2017-11882 using malicious XML files .

Remcos Attack Analysis

Phishing email opened in ANY.RUN interactive sandbox

U this examplewe came across another phishing email containing a .zip attachment and a password for it.

cmd process used during the infection chain

The final payload uses the command line and Windows system processes to load and execute Remcos.

The MITER ATT&CK Matrix provides a comprehensive view of malware usage techniques

The ANY.RUN sandbox maps the entire attack chain to the MITER ATT&CK matrix for convenience.

LockBit

LockBit is a ransomware that mainly targets Windows devices. It is considered one of the biggest ransomware threats, accounting for a significant portion of all ransomware-as-a-service (RaaS) attacks. The decentralized nature of the LockBit group has allowed it to compromise many prominent organizations around the world, including the UK’s Royal Mail and India’s National Aerospace Laboratories (in 2024).

Law enforcement took action against the LockBit group, which led to the arrest of several developers and partners. Despite these efforts, the group continues to work and plans to release a new version of LockBit 4.0 in 2025.

Analysis of the LockBit attack

The LockBit ransomware is launched in a secure ANY.RUN sandbox environment

Departure this sandbox sessionshowing how quickly LockBit infects and encrypts files on the system.

ANY.RUN’s interactive sandbox allows you to see a static analysis of every changed file in the system

Tracking the file system changes, we can see that it changed 300 files in less than a minute.

The ransom note instructs victims to contact the attackers

The malware also sends a ransom note with detailed instructions on how to get your data back.

Improve your preventative security with ANY.RUN’s interactive sandbox

Proactively analyzing cyber threats instead of reacting to them as soon as they become a problem for your organization is the best course of action any business can take. Make it easy with ANY.RUN’s interactive sandbox, examining all suspicious files and URLs in a secure virtual environment, helping you identify malicious content with ease.

With the ANY.RUN sandbox, your company can:

  • Quickly detect and confirm malicious files and links during routine scans.
  • Explore how malware works at a deeper level to uncover their tactics and strategies.
  • Respond more effectively to security incidents by gathering critical threat intelligence through sandbox analysis.

Experience all the features of ANY.RUN with a 14-day free trial.

Did you find this article interesting? This article is from one of our respected partners. Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.