Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

OpenAI’s AI Technology to Revolutionize Military Operations?

Google Chrome Zero-Day CVE-2025-2783 Taxoff exploits Trinper Backdoor

JPMorgan uses token JPMD, like Stablecoin, to move further into cipher

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Silver Fox Apt targets Taiwan with complex GH0stringe and HoldingHands rat malware
Identity

Silver Fox Apt targets Taiwan with complex GH0stringe and HoldingHands rat malware

userBy userJune 17, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 17, 2025Ravi LakshmananMalware/Email Security

Gh0stringe and HoldingHands rat malware

Cybersecurity researchers are using malware families such as HoldingHands Rat and Gh0stringe to warn of new phishing campaigns targeting Taiwanese users.

The activity is part of a broader campaign that provided the Winos 4.0 malware framework in early January this year by sending phishing messages that impersonate Taiwan’s National Tax Agency, Fortinet Fortiguard Labs said in a report shared with Hacker News.

Cybersecurity

The cybersecurity company said it had identified additional malware samples through continuous monitoring and observed the same threat actors delivering GH0STCRINGE and malware stocks based on holding rats, using malware layer PDF documents or zip files distributed via phishing emails.

It is worth noting that both HoldingHands rats (aka GH0STBINS) and GH0STRinge are variations of known remote access trojans called GH0st rats, which are widely used in Chinese hacking groups.

Silver Fox Apt is targeting Taiwan

The starting point for the attack is a phishing email spoofing a message from a government or business partner, employing lures related to taxes, invoices and pensions to persuade recipients to open attachments. Alternate attack chains are known to utilize embedded images that download malware when clicked.

The PDF file contains a link that redirects future targets to the download page that hosts the ZIP archive. Within the file you will find some legitimate executables, shellcode loaders, and encrypted shellcode.

Multistage infection sequences require the use of a shellcode loader. This is nothing more than a DLL file sideloaded by a legitimate binary using DLL sideloading techniques. The intermediate payload deployed as part of the attack includes anti-VMs and privilege escalations to ensure that the malware is not being blocked by the compromised host.

Cybersecurity

This attack reaches its peak with the execution of “MSGDB.DAT”. This allows Command and Control (C2) to work to collect user information and download additional modules to facilitate file management and remote desktop functionality.

Fortinet also found threat actors propagating gh0stringe via PDF attachments in phishing emails that record users to download HTM pages.

“The attack chain consists of numerous snippets of shellcode and loader that complicates the flow of the attack,” the company said. “Beyond Winos, HoldingHands and Gh0stringe, this threat group is continuing to evolve its malware and distribution strategies.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDates and venues announced for CN Agency Leader Summit 2025
Next Article ABPCO Director Heather Rishman retired early
user
  • Website

Related Posts

Google Chrome Zero-Day CVE-2025-2783 Taxoff exploits Trinper Backdoor

June 17, 2025

A bug in Langsmith could expose Openai keys and user data via malicious agents

June 17, 2025

Google warns of scattered spider attacks targeting IT support teams of US insurance companies

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s AI Technology to Revolutionize Military Operations?

Google Chrome Zero-Day CVE-2025-2783 Taxoff exploits Trinper Backdoor

JPMorgan uses token JPMD, like Stablecoin, to move further into cipher

A $16 billion worth of lamps in a peter ties founder fund-led deal

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

OpenAI’s AI Technology to Revolutionize Military Operations?

Elon Musk’s AI startup Xai raises $4.3 billion in equity funding in addition to $5 billion in debt transactions during the surge in AI costs

Sword Health lands $40 million to expand AI care into mental health, valuing $4 billion

R0AR introduces a unified defi platform for tokens, liquidity and NFT staking

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.