Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Why is the misinformation continuing five years after George Floyd’s death | Racism News

Nuclear investment is on the rise. These strains provide exposure

Messi to face the Philadelphia Union in MLS | Football News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Hackers deliver Winos 4.0 malware using fake VPN and browser NSIS installer
Identity

Hackers deliver Winos 4.0 malware using fake VPN and browser NSIS installer

userBy userMay 25, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 25, 2025Ravi LakshmananThreat Intelligence/Software Security

Winos 4.0 Malware

Cybersecurity researchers have disclosed malware campaigns that use fake software installers that deliver the WINOS 4.0 framework under the guise of popular tools such as LetSVPN and QQ browsers.

This campaign was first detected by Rapid7 in February 2025 and includes the use of a multi-stage memory resident loader called Catena.

“Catena uses embedded shellcode and configuration switching logic to completely use step-by-step payloads like Winos 4.0 for memory and bypass traditional antivirus tools.” “Once installed, it quietly connects to an attacker-controlled server (which is primarily hosted in Hong Kong) and receives follow-up instructions or additional malware.”

The attack appears to be particularly focused on Chinese-speaking environments, as it invokes “careful and long-term planning” by highly capable threat actors, similar to those who have deployed Winos 4.0 in the past.

Winos 4.0 (aka Valleyrat) was first published by Trend Micro in June 2024 as it was used in an attack targeting Chinese-speaking users using the VPN app’s malicious Windows Installer (MSI) file. This activity is attributed to a threat cluster that tracks it as a void arachne, also known as Silver Fox.

Cybersecurity

Subsequent campaigns to distribute malware utilize Rivals to trick users into installing game-related applications such as installation tools, speed boosters and optimization utilities. Another wave of attack targeting Taiwanese entities via phishing emails from the National Tax Agency in February 2025.

Built on top of the foundations of a known remote access trojan called Gh0st rat, Winos 4.0 is a highly malicious framework written in C++ that uses a plug-in-based system to collect data, provide remote shell access, and launch distributed denial of service (DDOS) attacks.

Winos 4.0 MalwareQQBrowser-based infection flow observed in February 2025

Rapid7 said all artifacts flagged in February 2025 rely on signed decoy apps, shellcodes embedded in “.ini” files, and NSIS installers bundled with reflexive DLL injections to secretly maintain the persistence of infected hosts and avoid detection. Monica catenas are given throughout the infection chain.

“This campaign has been active throughout 2025 and shows a consistent infection chain with some tactical adjustments. It refers to a capable and adaptive threat actor,” the researcher said.

The starting point is a Trojanized NSIS installer that impersonates the installer of the QQ browser, a Chromium-based web browser developed by Tencent, designed to use Catena to provide Winos 4.0. The malware communicates with the hard coding code and command and control (C2) infrastructure over TCP port 18856 and HTTPS port 443.

Winos 4.0 MalwareFrom LetSVPN installer in April 2025 to Winos 4.0

Host persistence is achieved by registering scheduled tasks that run several weeks after the initial compromise. The malware has explicit checks to find Chinese settings on your system, but even if it’s not, the execution is still in progress.

This indicates that it is an unfinished feature and is what is expected to be implemented in subsequent iterations of malware. That said, Rapid7 said in April 2025 that it not only switched some elements of the Catena execution chain, but also identified a “tactical change” that also incorporates features to avoid antivirus detection.

Cybersecurity

In the improved attack sequence, the NSIS installer impersonates it as a LetSVPN setup file and runs a PowerShell command that adds Microsoft Defender exclusion to all drives (C:\ to z:\). It then takes a snapshot of the processes associated with 360 Total Security, an antivirus product developed by Chinese vendor Qihoo 360, and drops additional payloads containing the executable to run the process and check.

The binary is signed with an expired certificate issued by Verisign and is said to belong to Tencent Technology (Shenzhen). It was valid from 2018-10-11 to 2020-02-02. The main responsibility of an executable is to reflectively load the DLL file that connects to the C2 server (“134.122.204[.]11:18852 “or” 103.46.185[.]44:443″) To download and run Winos 4.0.

“This campaign demonstrates well-organized, locally focused malware operations to quietly drop Winos 4.0 stagers using the Trojanized NSIS installer,” the researchers said.

“We are leaning heavily towards decoy software signed with legitimate certificates to avoid memory residents payloads, reflective DLL loads, and alarm rise. There are Silver Fox APTs targeting infrastructure duplication and language-based targets, and activities targeting Chinese environments.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleForeign universities want to seduce scientists from the US after Trump’s research has been cut
Next Article Russia-Ukraine War: List of Major Events, Day 1,186 | News of the Russian-Ukraine War
user
  • Website

Related Posts

Hackers use Tiktok videos to distribute Vidar and Stealc malware via Clickfix techniques

May 23, 2025

VisicorTrap uses Cisco flaws to build a global honeypot from 5,300 compromised devices

May 23, 2025

Discover the Importance of Fact-Checking: Empower Your Digital Self in the Age of Misinformation

May 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Why is the misinformation continuing five years after George Floyd’s death | Racism News

Nuclear investment is on the rise. These strains provide exposure

Messi to face the Philadelphia Union in MLS | Football News

Thunder-Timberwolves: Edwards, Minnesota State’s Defeat 3 Game Final | Basketball News

Trending Posts

Why is the misinformation continuing five years after George Floyd’s death | Racism News

May 25, 2025

Messi to face the Philadelphia Union in MLS | Football News

May 25, 2025

Thunder-Timberwolves: Edwards, Minnesota State’s Defeat 3 Game Final | Basketball News

May 25, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Builder.ai, a Microsoft-backed AI startup, was once valued at $1.2 billion. Bankruptcy File: Will AI be in a different .com bubble?

Nitro Nation: Mythical Games, the first complete player-centric gaming platform from NFL rivals

Beyond Hype: 55% of Spanish Companies Prove AI’s Impact on Decisions

Prompt Killed Startups: How AI Will Be Launched Before Starting Running Founder’s Best Ideas

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.