Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Hackers Target Chinese Users With RAT, Rootkit

Posted on June 27, 2025June 27, 2025 By CWS

Pretend installers distributed by Chinese language-language web sites are infecting customers with a distant entry trojan (RAT) and a rootkit, Netskope studies.

Masquerading as authentic software program, equivalent to WPS Workplace, Sogou, and DeepSeek, the installers had been seen deploying a Gh0stRAT variant named Sainbox RAT, and the open supply Hidden rootkit, prone to obtain stealthy entry to victims’ techniques.

The faux websites noticed on this marketing campaign, Netskope says, mimic the official web sites of authentic software program. Nonetheless, when the consumer downloads the faux installers (MSI recordsdata and a PE installer), the file is fetched from a special URL.

Upon execution, the MSI recordsdata run a authentic file named ‘Shine.exe’, which is used to sideload a malicious DLL, and execute the real installer software program to cover the nefarious operation. A TXT file containing shellcode and a malware payload can be dropped.

The DLL, a faux model of the libcef library, a part of the Chromium Embedded Framework (CEF), begins in a perform referred to as by Shine.exe. The perform units persistence, masses the contents of the TXT file in reminiscence, and redirects the management move to the beginning of the shellcode.

Primarily based on the open supply instrument sRDI, the shellcode is supposed to reflectively load a DLL into reminiscence and name two features, together with one which begins the malicious payload’s exercise.

The DLL payload was recognized because the Sainbox RAT, which contained in its .knowledge part a rootkit driver primarily based on the Hidden mission. Embedded as a PE binary, the rootkit could be executed in sure malware configurations.

“The first aim of the rootkit is to hide gadgets equivalent to processes, recordsdata, and registry keys and values. It does so through the use of a mini-filter in addition to kernel callbacks. It could possibly additionally defend itself and particular processes, and comprises a consumer interface that’s accessed utilizing IOCTL,” Netskope says.Commercial. Scroll to proceed studying.

The Sainbox RAT permits attackers to fetch and run extra payloads, steal info, and carry out different malicious actions. The Hidden rootkit gives stealth by hiding payloads, stopping course of termination, and stopping detection.

Based on Netskope, the marketing campaign seems to have been orchestrated by the China-linked Silver Fox hacking group, primarily based on the employed TTPs, the usage of faux web sites and installers for common Chinese language software program, and focusing on.

Silver Fox has been round for at the very least one 12 months and a few researchers imagine it might be an APT masquerading as a cybercrime group. 

Associated: Hackers Abuse ConnectWise to Conceal Malware

Associated: SonicWall Warns of Trojanized NetExtender Stealing Person Info

Associated: Godfather Android Trojan Creates Sandbox on Contaminated Gadgets

Associated: Microsoft Warns of Node.js Abuse for Malware Supply

Security Week News Tags:Chinese, Hackers, RAT, Rootkit, Target, Users

Post navigation

Previous Post: Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability
Next Post: RevEng.ai Raises $4.15 Million to Secure Software Supply Chain

Related Posts

MI5 Warns Lawmakers That Chinese Spies Are Trying to Reach Them via LinkedIn Security Week News
Gambling Tech Firm Bragg Discloses Cyberattack Security Week News
US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’ Security Week News
HeroDevs Raises $125 Million to Secure Deprecated OSS Security Week News
CISA Analyzes Malware From Ivanti EPMM Intrusions Security Week News
iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Instagram Confirms no System Breach and Fixed External Party Password Reset Issue
  • Network Security Checklist – 2026
  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Instagram Confirms no System Breach and Fixed External Party Password Reset Issue
  • Network Security Checklist – 2026
  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark