Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
Winos 4.0 Malware Attacks Expand to Japan and Malaysia with HoldingHands RAT
Advertisements

Cybersecurity researchers have identified an expansion in the targeting footprint of the threat actors behind the Winos 4.0 malware, also known as ValleyRAT. Previously focused on China and Taiwan, the group’s campaigns now target entities in Japan and Malaysia. This recent wave of attacks utilizes an additional remote access trojan (RAT) which has been tracked as HoldingHands RAT, or Gh0stBins. The operation is linked to an aggressive Chinese cybercrime group and marks a significant geographical expansion of their activities.

Phishing Campaign Leverages Malicious PDFs

The primary delivery method for this campaign involves sophisticated phishing techniques. According to Pei Han Liao, a researcher with Fortinet’s FortiGuard Labs, “The campaign relied on phishing emails with PDFs that contained embedded malicious links.” These deceptive files were carefully crafted to look like official documents originating from the Ministry of Finance. The PDFs contained multiple links, but one specifically delivered the Winos 4.0 malware payload to the victim’s system, exploiting the user’s trust in official-looking communications.

SEO Poisoning and Software Masquerading

Winos 4.0 is a malware family known for its diverse distribution methods, including phishing and search engine optimization (SEO) poisoning. In other campaigns, the threat actors use SEO poisoning to guide unsuspecting users to malicious websites. These sites are designed to impersonate the legitimate download pages for popular software applications. The list of spoofed software is extensive and includes well-known names such as Google Chrome, Telegram, Youdao, Sogou AI, WPS Office, and DeepSeek. By luring users into downloading these tainted installers, the attackers gain initial access to the target networks.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading