Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake Antivirus Site Spreads ValleyRAT Malware

Fake Antivirus Site Spreads ValleyRAT Malware

Posted on February 24, 2026 By CWS

Malicious Campaign Targets Users with Fake Antivirus

In a sophisticated cyberattack, threat actors have set up a deceptive clone of the Huorong Security antivirus website to distribute ValleyRAT, a Remote Access Trojan (RAT). This campaign, attributed to the Silver Fox APT group, primarily targets users by masquerading as legitimate Chinese software.

Huorong Security, or 火绒 in Chinese, is a popular antivirus tool across mainland China. Cybercriminals registered the domain huoronga[.]com, closely mimicking the official huorong.cn site, only altering a single letter. This form of typosquatting preys on unwary users who might mistype the URL or fall for phishing links, presenting a convincing facade that few would question.

Technical Analysis of the Attack

Malwarebytes researchers uncovered the full infection sequence, revealing that download requests from the fake site are routed through an intermediary before delivering the payload from Cloudflare R2. The downloaded file, BR火绒445[.]zip, maintains the guise of authenticity by using Huorong’s Chinese name until execution.

This attack does not utilize zero-day vulnerabilities; rather, it relies on a convincing webpage, a realistic installer, and the assumption that many users click the first search result they see. The tactic is particularly effective as it involves a security product, drawing in those actively seeking protection.

Capabilities and Impacts of ValleyRAT

Once installed, ValleyRAT enables attackers to monitor victims, steal sensitive data, and gain remote control over the infected system. The malware is capable of keylogging, accessing browser cookies, querying system information, and injecting code for covert execution. Its modular architecture allows for additional capabilities to be downloaded as needed, complicating the assessment of its full impact.

To maintain persistence, ValleyRAT manipulates Windows Defender via PowerShell to ignore its directories and processes. It establishes a scheduled task named “Batteries” to ensure re-execution upon system boot, maintaining a connection to a command-and-control server.

Protective Measures and Indicators of Compromise

To mitigate this threat, organizations should block outbound connections to the command-and-control IP at 161.248.87[.]250, audit Windows Defender for unauthorized exclusions, and check for the “Batteries” scheduled task and suspicious directories as signs of compromise.

Indicators of compromise include several fake domains such as huoronga[.]com, multiple SHA-256 hashes of involved files, and configuration details stored in the Windows registry. Vigilance and proactive measures are essential to detect and prevent further exploitation.

This campaign highlights the importance of cybersecurity awareness and the need for robust protective measures against increasingly sophisticated threats.

Cyber Security News Tags:APT group, China, cyber attack, cyber threat, Cybersecurity, fake website, Huorong Security, Malware, malware analysis, Phishing, remote access trojan, Threat Actors, Trojan, typosquatting, ValleyRAT

Post navigation

Previous Post: Upcoming DMARC Enhancements Discussed by Email Experts
Next Post: GitHub Codespaces Vulnerability Enables Repository Takeover

Related Posts

Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence Cyber Security News
Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild Cyber Security News
Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware Cyber Security News
Socelars Malware Targets Windows for Data Theft Socelars Malware Targets Windows for Data Theft Cyber Security News
Ferocious Kitten APT Deploying MarkiRAT to Capture Keystroke and Clipboard Logging Ferocious Kitten APT Deploying MarkiRAT to Capture Keystroke and Clipboard Logging Cyber Security News
New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials New SHUYAL Attacking 19 Popular Browsers to Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Enhances Gmail with Mobile End-to-End Encryption
  • Google Enhances Chrome Security with Device-Bound Sessions
  • Law Enforcement’s Use of Webloc for Global Device Tracking
  • AI-Powered Cyberattack Compromises Mexican Government Agencies
  • Rise of Advanced EDR Killers in Ransomware Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Enhances Gmail with Mobile End-to-End Encryption
  • Google Enhances Chrome Security with Device-Bound Sessions
  • Law Enforcement’s Use of Webloc for Global Device Tracking
  • AI-Powered Cyberattack Compromises Mexican Government Agencies
  • Rise of Advanced EDR Killers in Ransomware Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark