In this article, Igal Lytzki explores the dynamics of communication between the XWorm malware and the operating server, as well as the methods for decrypting the data and commands sent to the victim.

Click for details.