Executive Summary
In Q4 2025, a significant phishing campaign known as "Curriculum-vitae-catalina" targeted HR personnel globally. Attackers sent emails disguised as job applications, with subjects like "Resume" or "Attached Resume," containing malicious attachments named "Curriculum Vitae-Catalina.exe." When executed, these files installed the Backdoor.MSIL.XWorm malware, granting remote control over infected systems. The campaign unfolded in two waves: the first in October affecting regions including Russia, Western Europe, South America, and Canada; the second in November impacting other areas. The attack subsided by December. Regions with historically high email threat rates, such as Southern Europe, South America, and the Middle East, reported the highest infection rates. In Africa, the malware also spread via USB devices connected to ICS computers. (securelist.com)
This incident underscores the evolving sophistication of phishing attacks targeting industrial control systems (ICS). The widespread distribution and rapid propagation of Backdoor.MSIL.XWorm highlight the critical need for enhanced email security measures and user awareness training to mitigate such threats.
Why This Matters Now
The Backdoor.MSIL.XWorm campaign exemplifies the increasing complexity and reach of phishing attacks targeting critical infrastructure. As attackers refine their methods, organizations must prioritize robust cybersecurity protocols, continuous monitoring, and employee education to defend against such pervasive threats.
Attack Path Analysis
The attack began with phishing emails containing malicious attachments disguised as resumes, leading to the execution of the Backdoor.MSIL.XWorm malware. Once executed, the malware established persistence through scheduled tasks and registry modifications, allowing it to maintain control over the infected system. The backdoor then performed system checks to evade detection and potentially disabled security tools to avoid being identified. It utilized non-standard ports and protocols to establish command and control channels, enabling remote control by the attacker. The malware facilitated data exfiltration by transmitting sensitive information over these covert channels. Finally, the attack could lead to significant operational disruptions, including data destruction or encryption, resulting in business impact.
Kill Chain Progression
Initial Compromise
Description
Phishing emails with malicious attachments disguised as resumes were sent to HR personnel, leading to the execution of Backdoor.MSIL.XWorm upon opening.
MITRE ATT&CK® Techniques
Spearphishing Attachment
Malicious File
Masquerading
Scheduled Task
Ingress Tool Transfer
Exploitation of Remote Services
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities by installing applicable vendor-supplied security patches.
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity and Access Management
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Industrial Automation
Direct target of multi-vector malware campaigns affecting ICS computers with 19.7% malicious object detection rate, requiring enhanced segmentation and traffic encryption.
Oil/Energy/Solar/Greentech
Only sector showing increased malicious object blocking in Q4 2025, vulnerable to worms and phishing attacks targeting critical energy infrastructure systems.
Utilities
High-risk infrastructure exposed to industrial automation threats, requiring zero trust segmentation and encrypted traffic protection against lateral movement attacks.
Manufacturing
Critical exposure to AutoCAD malware, worms via removable media, and network folder propagation affecting production systems and requiring comprehensive endpoint protection.
Sources
- Threat landscape for industrial automation systems in Q4 2025https://securelist.com/industrial-threat-report-q4-2025/119392/Verified
- Threat landscape for industrial automation systems. Q4 2025https://ics-cert.kaspersky.com/publications/reports/2026/04/02/threat-landscape-for-industrial-automation-systems-q4-2025Verified
- Backdoor.MSIL.XWorm.cvqhttps://threats.kaspersky.com/en/threat/Backdoor.MSIL.XWorm.cvq/Verified
- Backdoor:MSIL/XWorm!MSR threat descriptionhttps://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Backdoor%3AMSIL%2FXWorm%21MSRVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could likely limit the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and controlled egress policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix Zero Trust CNSF primarily focuses on network segmentation and traffic control, it may not directly prevent initial compromises via phishing emails.
Control: Zero Trust Segmentation
Mitigation: By implementing Zero Trust Segmentation, Aviatrix Zero Trust CNSF could likely limit the malware's ability to escalate privileges by restricting unauthorized access paths.
Control: East-West Traffic Security
Mitigation: Aviatrix Zero Trust CNSF's East-West Traffic Security could likely constrain the malware's lateral movement by monitoring and controlling internal traffic flows.
Control: Multicloud Visibility & Control
Mitigation: With Multicloud Visibility & Control, Aviatrix Zero Trust CNSF could likely detect and restrict unauthorized command and control communications over non-standard ports.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Zero Trust CNSF's Egress Security & Policy Enforcement could likely limit data exfiltration by controlling and monitoring outbound traffic.
By implementing Aviatrix Zero Trust CNSF, the potential impact of such attacks could likely be reduced by limiting the attacker's ability to access and manipulate critical systems.
Impact at a Glance
Affected Business Functions
- Human Resources
- Recruitment
- Email Communications
Estimated downtime: 7 days
Estimated loss: $50,000
Potential exposure of sensitive HR data, including resumes and personal information of job applicants.
Recommended Actions
Key Takeaways & Next Steps
- • Implement robust email filtering and user training to prevent phishing attacks.
- • Deploy endpoint detection and response solutions to identify and mitigate malware persistence mechanisms.
- • Utilize network segmentation and east-west traffic monitoring to detect and prevent lateral movement.
- • Enforce strict egress filtering and monitor for non-standard communication channels to disrupt command and control activities.
- • Establish comprehensive data loss prevention strategies to detect and prevent unauthorized data exfiltration.



