InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Hackers deliver Winos 4.0 malware using fake VPN and browser NSIS installer
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Hackers deliver Winos 4.0 malware using fake VPN and browser NSIS installer
Technology

Hackers deliver Winos 4.0 malware using fake VPN and browser NSIS installer

May 25, 2025 5 Min Read
Share
Winos 4.0 Malware
SHARE

Cybersecurity researchers use malware campaigns using fake software installers, pose as popular tools such as LetSVPN and QQ browsers. Winos 4.0 Framework.

This campaign was first detected by Rapid7 in February 2025 and includes the use of a multi-stage memory resident loader called Catena.

“Catena uses embedded shellcode and configuration switching logic to completely use step-by-step payloads like Winos 4.0 for memory and bypass traditional antivirus tools.” “Once installed, it quietly connects to an attacker-controlled server (which is primarily hosted in Hong Kong) and receives follow-up instructions or additional malware.”

The attack appears to be particularly focused on Chinese-speaking environments, as it invokes “careful and long-term planning” by highly capable threat actors, similar to those who have deployed Winos 4.0 in the past.

Winos 4.0 (aka Valleyrat) was first published by Trend Micro in June 2024 as it was used in an attack targeting Chinese-speaking users using the VPN app’s malicious Windows Installer (MSI) file. This activity is attributed to a threat cluster that tracks it as a void arachne, also known as Silver Fox.

Subsequent campaigns to distribute malware utilize Rivals to trick users into installing game-related applications such as installation tools, speed boosters and optimization utilities. Another wave of attack targeting Taiwanese entities via phishing emails from the National Tax Agency in February 2025.

Built on top of the foundations of a known remote access trojan called Gh0st rat, Winos 4.0 is a highly malicious framework written in C++ that uses a plug-in-based system to collect data, provide remote shell access, and launch distributed denial of service (DDOS) attacks.

See also  How AI agents are transforming the education sector: See Kira Learning and Beyond
Winos 4.0 Malware
QQBrowser-based infection flow observed in February 2025

Rapid7 said all artifacts flagged in February 2025 rely on signed decoy apps, shellcodes embedded in “.ini” files, and NSIS installers bundled with reflexive DLL injections to secretly maintain the persistence of infected hosts and avoid detection. Monica catenas are given throughout the infection chain.

“This campaign has been active throughout 2025 and shows a consistent infection chain with some tactical adjustments. It refers to a capable and adaptive threat actor,” the researcher said.

The starting point is a Trojanized NSIS installer that impersonates the installer of the QQ browser, a Chromium-based web browser developed by Tencent, designed to use Catena to provide Winos 4.0. The malware communicates with the hard coding code and command and control (C2) infrastructure over TCP port 18856 and HTTPS port 443.

Winos 4.0 Malware
From LetSVPN installer in April 2025 to Winos 4.0

Host persistence is achieved by registering scheduled tasks that run several weeks after the initial compromise. The malware has explicit checks to find Chinese settings on your system, but even if it’s not, the execution is still in progress.

This indicates that it is an unfinished feature and is what is expected to be implemented in subsequent iterations of malware. That said, Rapid7 said in April 2025 that it not only switched some elements of the Catena execution chain, but also identified a “tactical change” that also incorporates features to avoid antivirus detection.

In the improved attack sequence, the NSIS installer impersonates it as a LetSVPN setup file and runs a PowerShell command that adds Microsoft Defender exclusion to all drives (C: to z:). It then takes a snapshot of the processes associated with 360 Total Security, an antivirus product developed by Chinese vendor Qihoo 360, and drops additional payloads containing the executable to run the process and check.

See also  How good is Real Research's AI agent? In the deep search bench report

The binary is signed with an expired certificate issued by Verisign and is said to belong to Tencent Technology (Shenzhen). It was valid from 2018-10-11 to 2020-02-02. The main responsibility of the executable is to reflectively load DLL files that connect to the C2 server (“134.122.204(.) 11:18852” or “103.46.185(.) 44:443”) to download and run Winos 4.0.

“This campaign demonstrates well-organized, locally focused malware operations to quietly drop Winos 4.0 stagers using the Trojanized NSIS installer,” the researchers said.

“We are leaning heavily towards decoy software signed with legitimate certificates to avoid memory residents payloads, reflective DLL loads, and alarm rise. There are Silver Fox APTs targeting infrastructure duplication and language-based targets, and activities targeting Chinese environments.”

Share This Article
Twitter Copy Link
Previous Article Onimusha 2 Remaster Review - Authentic for Disability Onimusha 2 Remaster Review – Authentic for Disability
Next Article mm How Manus AI is redefineing autonomous workflow automation across the industry

Latest News

mm

AI and national security: a new battlefield

Artificial intelligence is changing the way nations protect themselves. It…

June 12, 2025
Zero-click AI vulnerability exposes Microsoft 365 Copilot data without user interaction

Zero-click AI vulnerability exposes Microsoft 365 Copilot data without user interaction

A new attack technology named Echoleak is characterized as a…

June 12, 2025
mm

Evogene and Google Cloud unveils basic models for the design of generative molecules, pioneering a new era of life science.

Evogene Ltd. has announced beginners in the class Generated AI…

June 11, 2025
Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.

Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.

Wednesday Interpol announced the dismantling of over 20,000 malicious IP…

June 11, 2025
mm

“Secure” images are not difficult to steal with AI.

New research suggests that watermarking tools aimed at blocking AI…

June 10, 2025

You Might Also Like

mm
Technology

How Patronas AI Judges Shape the Future of Multimodal AI Evaluation

9 Min Read
MIMO Hackers exploit CVE-2025-32432 in CRACK CMS to deploy CryptoMiner and Proxyware
Technology

MIMO Hackers exploit CVE-2025-32432 in CRACK CMS to deploy CryptoMiner and Proxyware

4 Min Read
Actively Exploited Vulnerability in SonicWall SMA Devices
Technology

CISA flags actively exploit vulnerabilities in SonicWall SMA devices

1 Min Read
mm
Technology

Build an infrastructure for effective atmosphere coding in the enterprise

9 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?