Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Hackers Target Chinese Users With RAT, Rootkit

Posted on June 27, 2025June 27, 2025 By CWS

Pretend installers distributed by Chinese language-language web sites are infecting customers with a distant entry trojan (RAT) and a rootkit, Netskope studies.

Masquerading as authentic software program, equivalent to WPS Workplace, Sogou, and DeepSeek, the installers had been seen deploying a Gh0stRAT variant named Sainbox RAT, and the open supply Hidden rootkit, prone to obtain stealthy entry to victims’ techniques.

The faux websites noticed on this marketing campaign, Netskope says, mimic the official web sites of authentic software program. Nonetheless, when the consumer downloads the faux installers (MSI recordsdata and a PE installer), the file is fetched from a special URL.

Upon execution, the MSI recordsdata run a authentic file named ‘Shine.exe’, which is used to sideload a malicious DLL, and execute the real installer software program to cover the nefarious operation. A TXT file containing shellcode and a malware payload can be dropped.

The DLL, a faux model of the libcef library, a part of the Chromium Embedded Framework (CEF), begins in a perform referred to as by Shine.exe. The perform units persistence, masses the contents of the TXT file in reminiscence, and redirects the management move to the beginning of the shellcode.

Primarily based on the open supply instrument sRDI, the shellcode is supposed to reflectively load a DLL into reminiscence and name two features, together with one which begins the malicious payload’s exercise.

The DLL payload was recognized because the Sainbox RAT, which contained in its .knowledge part a rootkit driver primarily based on the Hidden mission. Embedded as a PE binary, the rootkit could be executed in sure malware configurations.

“The first aim of the rootkit is to hide gadgets equivalent to processes, recordsdata, and registry keys and values. It does so through the use of a mini-filter in addition to kernel callbacks. It could possibly additionally defend itself and particular processes, and comprises a consumer interface that’s accessed utilizing IOCTL,” Netskope says.Commercial. Scroll to proceed studying.

The Sainbox RAT permits attackers to fetch and run extra payloads, steal info, and carry out different malicious actions. The Hidden rootkit gives stealth by hiding payloads, stopping course of termination, and stopping detection.

Based on Netskope, the marketing campaign seems to have been orchestrated by the China-linked Silver Fox hacking group, primarily based on the employed TTPs, the usage of faux web sites and installers for common Chinese language software program, and focusing on.

Silver Fox has been round for at the very least one 12 months and a few researchers imagine it might be an APT masquerading as a cybercrime group. 

Associated: Hackers Abuse ConnectWise to Conceal Malware

Associated: SonicWall Warns of Trojanized NetExtender Stealing Person Info

Associated: Godfather Android Trojan Creates Sandbox on Contaminated Gadgets

Associated: Microsoft Warns of Node.js Abuse for Malware Supply

Security Week News Tags:Chinese, Hackers, RAT, Rootkit, Target, Users

Post navigation

Previous Post: Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability
Next Post: RevEng.ai Raises $4.15 Million to Secure Software Supply Chain

Related Posts

Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List Security Week News
FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks Security Week News
Adobe Patches Big Batch of Critical-Severity Software Flaws Security Week News
Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach Security Week News
TeamFiltration Abused in Entra ID Account Takeover Campaign Security Week News
Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update
  • PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack
  • Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack
  • Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage 
  • Business Case for Agentic AI SOC Analysts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update
  • PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack
  • Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack
  • Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage 
  • Business Case for Agentic AI SOC Analysts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News