Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More

Dragon Breath uses RONINGLOADER to disable security tools and introduces Gh0st RAT

Turning submarine cables into environmental monitoring systems

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Dragon Breath uses RONINGLOADER to disable security tools and introduces Gh0st RAT
Identity

Dragon Breath uses RONINGLOADER to disable security tools and introduces Gh0st RAT

userBy userNovember 17, 2025No Comments6 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

An attacker known as Dragon Breath has been observed leveraging a multi-stage loader known by the codename RONINGLOADER to deliver a modified variant of the remote access Trojan known as Gh0st RAT.

According to Elastic Security Labs, the campaign primarily targets Chinese-speaking users and uses trojanized NSIS installers disguised as legitimate versions such as Google Chrome and Microsoft Teams.

Security researchers Jia Yu Chan and Salim Bitam said: “The infection chain employs a multi-stage delivery mechanism that leverages various evasion techniques and includes many redundancies aimed at neutralizing popular endpoint security products in the Chinese market.” “These include deploying legitimately signed drivers, deploying custom WDAC policies, and tampering with Microsoft Defender binaries via PPL.” [Protected Process Light] abuse. “

Dragon Breath, also known as APT-Q-27 and Golden Eye, was previously noted by Sophos in May 2023 in connection with a campaign that utilized a technique known as double-dip DLL sideloading in attacks targeting users in the Philippines, Japan, Taiwan, Singapore, Hong Kong, and China.

The hacker group is estimated to have been active since at least 2020 and is associated with a larger Chinese-speaking organization tracked as Miuuti Group, known for attacking the online gaming and gambling industry.

In the latest campaign documented by Elastic Security Labs, a malicious NSIS installer for a trusted application acts as a launch pad for two additional built-in NSIS installers, one of which (‘letsvpnlatest.exe’) installs benign, legitimate software. The second NSIS binary (‘Snieoatwtregoable.exe’) is responsible for secretly triggering the attack chain.

DFIR retainer service

This includes the delivery of DLLs and encrypted files (“tp.png”). The former is used to extract shellcode designed to read the contents of an expected PNG image and launch another binary in memory.

In addition to attempting to remove userland hooks by loading a new ‘ntdll.dll’, RONINGLOADER attempts to elevate privileges using the runas command and scans the list of running processes for hardcoded antivirus-related solutions such as Microsoft Defender Antivirus, Kingsoft Internet Security, Tencent PC Manager, and Qihoo 360 Total Security.

The malware then terminates the identified process. A different approach is taken if the identified process is associated with Qihoo 360 Total Security (e.g. ‘360tray.exe’, ‘360Safe.exe’, ‘ZhuDongFangYu.exe’). This step includes the following series of actions:

Modify the firewall to block all network communication Inject shellcode into the process (vssvc.exe) associated with the Volume Shadow Copy (VSS) service. However, it does not do so before granting itself the SeDebugPrivilege token. Start the VSS service and get its process ID. Injects shellcode into the VSS service process using a technique called PoolParty Load. It uses a signed driver named ‘ollama.sys’ to terminate the three processes using a temporary service called Temporary Services. Restore “xererre1” firewall settings

For other security processes, the loader writes drivers directly to disk, loads drivers, performs process termination, and creates a temporary service called “ollama” to stop and remove services.

RONINGLOADER execution flow

Once all security processes on the infected host are killed, RONINGLOADER runs a batch script to bypass User Account Control (UAC) and create firewall rules that block incoming and outgoing connections related to Qihoo 360 security software.

The malware has also been observed using two techniques documented earlier this year by security researcher Zero Salarium to exploit PPL and the Windows Error Reporting (‘WerFaultSecure.exe’) system (also known as EDR-Freeze) to disable Microsoft Defender Antivirus. Additionally, it targets Windows Defender Application Control (WDAC) by creating malicious policies that explicitly block Chinese security vendors Qihoo 360 Total Security and Huorong Security.

The loader’s ultimate goal is to inject a malicious DLL into the legitimate Windows binary “regsvr32.exe” to hide its activity and launch the next stage payload into another legitimate high-privileged system process such as “TrustedInstaller.exe” or “elevation_service.exe.” The final malware introduced is a modified version of the Gh0st RAT.

The Trojan is designed to communicate with a remote server to obtain additional instructions that allow it to configure Windows registry keys, clear Windows event logs, download and execute files from specified URLs, modify clipboard data, execute commands with ‘cmd.exe’, inject shellcode into ‘svchost.exe’, and execute payloads dropped to disk. This variant also implements modules that capture keystrokes, clipboard contents, and foreground window titles.

Brand impersonation campaign targeting Chinese speakers using Gh0st RAT

The disclosure comes after Palo Alto Networks Unit 42 announced it had identified two interconnected malware campaigns that used “extensive brand impersonation” to distribute the Gh0st RAT to Chinese-speaking users. This activity is not attributed to any known attacker or group.

CIS build kit

The first campaign, named Campaign Trio, ran from February to March 2025 on more than 2,000 domains imitating i4tools, Youdao, and DeepSeek, while the second campaign, detected in May 2025, is said to be more sophisticated and impersonated more than 40 applications, including QQ Music and Sogou browser. The second wave is codenamed “Campaign Chorus.”

Security researchers Keerthiraj Nagaraj, Vishwa Thothatthri, Nabeel Mohamed, and Reethika Ramesh said, “From the first campaign to the second, attackers evolved from simple droppers to complex multi-step infection chains that exploit signed legitimate software to bypass modern defenses.”

These domains were found to host ZIP archives containing trojanized installers, ultimately paving the way for the deployment of the Gh0st RAT. However, the second campaign not only leverages more software programs as decoys to reach a broader Chinese-speaking population, but also employs a “complex and elusive” infection chain using intermediate redirect domains to retrieve ZIP archives from public cloud service buckets.

campaign chorus attack chain

By doing so, this approach can bypass network filters that can block traffic from unknown domains, not to mention the operational resiliency of threat actors. In this case, the MSI installer also runs an embedded Visual Basic script that is responsible for decrypting and launching the final payload via DLL sideloading.

“The parallel operation of old and new infrastructure through continuous activity suggests an operation that is not just evolving, but consists of multiple infrastructures and different toolsets simultaneously,” the researchers said. “This could point to A/B testing of TTPs with different sets of victims with varying levels of complexity, or simply a cost-effective strategy to continue leveraging older assets for as long as they remain viable.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTurning submarine cables into environmental monitoring systems
Next Article Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More
user
  • Website

Related Posts

Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More

November 17, 2025

Adoption of Rust reduces Android memory safety bugs to less than 20% for the first time

November 17, 2025

RondoDox exploits unpatched XWiki servers to draw more devices into botnet

November 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More

Dragon Breath uses RONINGLOADER to disable security tools and introduces Gh0st RAT

Turning submarine cables into environmental monitoring systems

International research on population and family dynamics

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.