Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

Posted on May 25, 2025May 25, 2025 By CWS

Could 25, 2025Ravie LakshmananThreat Intelligence / Software program Safety
Cybersecurity researchers have disclosed a malware marketing campaign that makes use of pretend software program installers masquerading as common instruments like LetsVPN and QQ Browser to ship the Winos 4.0 framework.
The marketing campaign, first detected by Rapid7 in February 2025, includes the usage of a multi-stage, memory-resident loader known as Catena.
“Catena makes use of embedded shellcode and configuration switching logic to stage payloads like Winos 4.0 fully in reminiscence, evading conventional antivirus instruments,” safety researchers Anna Širokova and Ivan Feigl mentioned. “As soon as put in, it quietly connects to attacker-controlled servers – principally hosted in Hong Kong – to obtain follow-up directions or further malware.”
The assaults, like those who have deployed Winos 4.0 prior to now, seem to focus particularly on Chinese language-speaking environments, with the cybersecurity firm calling out the “cautious, long-term planning” by a really succesful risk actor.
Winos 4.0 (aka ValleyRAT) was first publicly documented by Pattern Micro in June 2024 as utilized in assaults concentrating on Chinese language-speaking customers by way of malicious Home windows Installer (MSI) information for VPN apps. The exercise has been attributed to a risk cluster it tracks as Void Arachne, which can also be known as Silver Fox.

Subsequent campaigns distributing the malware have leveraged gaming-related purposes like set up instruments, pace boosters, and optimization utilities as lures to trick customers into putting in it. One other assault wave detailed in February 2025 focused entities in Taiwan through phishing emails that presupposed to be from the Nationwide Taxation Bureau.
Constructed atop the foundations of a recognized distant entry trojan known as Gh0st RAT, Winos 4.0 is a complicated malicious framework written in C++ that makes use of a plugin-based system to reap knowledge, present distant shell entry, and launch distributed denial-of-service (DDoS) assaults.
QQBrowser-Based mostly An infection Circulate Noticed in February 2025
Rapid7 mentioned all of the artifacts flagged in February 2025 relied on NSIS installers bundled with signed decoy apps, shellcode embedded in “.ini” information, and reflective DLL injection to covertly preserve persistence on contaminated hosts and keep away from detection. All the an infection chain has been given the moniker Catena.
“The marketing campaign has to this point been lively all through 2025, displaying a constant an infection chain with some tactical changes – pointing to a succesful and adaptive risk actor,” the researchers mentioned.
The start line is a trojanized NSIS installer impersonating an installer for QQ Browser, a Chromium-based internet browser developed by Tencent, that is designed to ship Winos 4.0 utilizing Catena. The malware communicates with hard-coded command-and-control (C2) infrastructure over TCP port 18856 and HTTPS port 443.
From LetsVPN Installer to Winos 4.0 in April 2025
Persistence on the host is achieved by registering scheduled duties which might be executed weeks after the preliminary compromise. Whereas the malware options an express examine to search for Chinese language language settings on the system, it nonetheless proceeds with the execution even when that is not the case.
This means it is an unfinished function and one thing that is anticipated to be carried out in subsequent iterations of the malware. That mentioned, Rapid7 mentioned it recognized in April 2025 a “tactical shift” that not solely switched a few of the components of the Catena execution chain, but in addition included options to evade antivirus detection.

Within the revamped assault sequence, the NSIS installer disguises itself as a setup file for LetsVPN and runs a PowerShell command that provides Microsoft Defender exclusions for all drives (C: to Z:). It then drops further payloads, together with an executable that takes a snapshot of working processes and checks for processes associated to 360 Complete Safety, an antivirus product developed by Chinese language vendor Qihoo 360.
The binary is signed with an expired certificates issued by VeriSign and allegedly belongs to Tencent Know-how (Shenzhen). It was legitimate from 2018-10-11 to 2020-02-02. The first duty of the executable is to reflectively load a DLL file that, in flip, connects to a C2 server (“134.122.204[.]11:18852” or “103.46.185[.]44:443”) as a way to obtain and execute Winos 4.0.
“This marketing campaign reveals a well-organized, regionally targeted malware operation utilizing trojanized NSIS installers to quietly drop the Winos 4.0 stager,” the researchers mentioned.
“It leans closely on memory-resident payloads, reflective DLL loading, and decoy software program signed with legit certificates to keep away from elevating alarms. Infrastructure overlaps and language-based concentrating on trace at ties to Silver Fox APT, with exercise probably geared toward Chinese language-speaking environments.”

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Browser, Deliver, Fake, Hackers, Installers, Malware, NSIS, VPN, Winos

Post navigation

Previous Post: How to Set Strong Privacy Settings on Facebook/Instagram

Related Posts

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique The Hacker News
Key Insights from the 2025 State of Pentesting Report The Hacker News
Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks The Hacker News
SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root The Hacker News
Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More The Hacker News
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware
  • How to Set Strong Privacy Settings on Facebook/Instagram
  • How to Secure Your Work-from-Home Setup
  • How to Secure Your Smartphone from Hackers
  • How to Secure Your Personal Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware
  • How to Set Strong Privacy Settings on Facebook/Instagram
  • How to Secure Your Work-from-Home Setup
  • How to Secure Your Smartphone from Hackers
  • How to Secure Your Personal Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News