Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake Antivirus Site Spreads ValleyRAT Malware

Fake Antivirus Site Spreads ValleyRAT Malware

Posted on February 24, 2026 By CWS

Malicious Campaign Targets Users with Fake Antivirus

In a sophisticated cyberattack, threat actors have set up a deceptive clone of the Huorong Security antivirus website to distribute ValleyRAT, a Remote Access Trojan (RAT). This campaign, attributed to the Silver Fox APT group, primarily targets users by masquerading as legitimate Chinese software.

Huorong Security, or 火绒 in Chinese, is a popular antivirus tool across mainland China. Cybercriminals registered the domain huoronga[.]com, closely mimicking the official huorong.cn site, only altering a single letter. This form of typosquatting preys on unwary users who might mistype the URL or fall for phishing links, presenting a convincing facade that few would question.

Technical Analysis of the Attack

Malwarebytes researchers uncovered the full infection sequence, revealing that download requests from the fake site are routed through an intermediary before delivering the payload from Cloudflare R2. The downloaded file, BR火绒445[.]zip, maintains the guise of authenticity by using Huorong’s Chinese name until execution.

This attack does not utilize zero-day vulnerabilities; rather, it relies on a convincing webpage, a realistic installer, and the assumption that many users click the first search result they see. The tactic is particularly effective as it involves a security product, drawing in those actively seeking protection.

Capabilities and Impacts of ValleyRAT

Once installed, ValleyRAT enables attackers to monitor victims, steal sensitive data, and gain remote control over the infected system. The malware is capable of keylogging, accessing browser cookies, querying system information, and injecting code for covert execution. Its modular architecture allows for additional capabilities to be downloaded as needed, complicating the assessment of its full impact.

To maintain persistence, ValleyRAT manipulates Windows Defender via PowerShell to ignore its directories and processes. It establishes a scheduled task named “Batteries” to ensure re-execution upon system boot, maintaining a connection to a command-and-control server.

Protective Measures and Indicators of Compromise

To mitigate this threat, organizations should block outbound connections to the command-and-control IP at 161.248.87[.]250, audit Windows Defender for unauthorized exclusions, and check for the “Batteries” scheduled task and suspicious directories as signs of compromise.

Indicators of compromise include several fake domains such as huoronga[.]com, multiple SHA-256 hashes of involved files, and configuration details stored in the Windows registry. Vigilance and proactive measures are essential to detect and prevent further exploitation.

This campaign highlights the importance of cybersecurity awareness and the need for robust protective measures against increasingly sophisticated threats.

Cyber Security News Tags:APT group, China, cyber attack, cyber threat, Cybersecurity, fake website, Huorong Security, Malware, malware analysis, Phishing, remote access trojan, Threat Actors, Trojan, typosquatting, ValleyRAT

Post navigation

Previous Post: Upcoming DMARC Enhancements Discussed by Email Experts

Related Posts

Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition Cyber Security News
Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation Cyber Security News
New Battering RAM Attack Bypasses Latest Defenses on Intel and AMD Cloud Processors New Battering RAM Attack Bypasses Latest Defenses on Intel and AMD Cloud Processors Cyber Security News
Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram Cyber Security News
Apache Tomcat Security Vulnerabilities Expose Servers to Remote Code Execution Attacks Apache Tomcat Security Vulnerabilities Expose Servers to Remote Code Execution Attacks Cyber Security News
Jenkins Security Flaws Pose Major XSS Threats Jenkins Security Flaws Pose Major XSS Threats Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake Antivirus Site Spreads ValleyRAT Malware
  • Upcoming DMARC Enhancements Discussed by Email Experts
  • New Tactics by AMOS Malware Target Apple Users
  • GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN
  • ASP.NET Developers Targeted by Malicious NuGet Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake Antivirus Site Spreads ValleyRAT Malware
  • Upcoming DMARC Enhancements Discussed by Email Experts
  • New Tactics by AMOS Malware Target Apple Users
  • GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN
  • ASP.NET Developers Targeted by Malicious NuGet Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News