Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Hackers Target Chinese Users With RAT, Rootkit

Chinese Hackers Target Chinese Users With RAT, Rootkit

Posted on June 27, 2025June 27, 2025 By CWS

Pretend installers distributed by Chinese language-language web sites are infecting customers with a distant entry trojan (RAT) and a rootkit, Netskope studies.

Masquerading as authentic software program, equivalent to WPS Workplace, Sogou, and DeepSeek, the installers had been seen deploying a Gh0stRAT variant named Sainbox RAT, and the open supply Hidden rootkit, prone to obtain stealthy entry to victims’ techniques.

The faux websites noticed on this marketing campaign, Netskope says, mimic the official web sites of authentic software program. Nonetheless, when the consumer downloads the faux installers (MSI recordsdata and a PE installer), the file is fetched from a special URL.

Upon execution, the MSI recordsdata run a authentic file named ‘Shine.exe’, which is used to sideload a malicious DLL, and execute the real installer software program to cover the nefarious operation. A TXT file containing shellcode and a malware payload can be dropped.

The DLL, a faux model of the libcef library, a part of the Chromium Embedded Framework (CEF), begins in a perform referred to as by Shine.exe. The perform units persistence, masses the contents of the TXT file in reminiscence, and redirects the management move to the beginning of the shellcode.

Primarily based on the open supply instrument sRDI, the shellcode is supposed to reflectively load a DLL into reminiscence and name two features, together with one which begins the malicious payload’s exercise.

The DLL payload was recognized because the Sainbox RAT, which contained in its .knowledge part a rootkit driver primarily based on the Hidden mission. Embedded as a PE binary, the rootkit could be executed in sure malware configurations.

“The first aim of the rootkit is to hide gadgets equivalent to processes, recordsdata, and registry keys and values. It does so through the use of a mini-filter in addition to kernel callbacks. It could possibly additionally defend itself and particular processes, and comprises a consumer interface that’s accessed utilizing IOCTL,” Netskope says.Commercial. Scroll to proceed studying.

The Sainbox RAT permits attackers to fetch and run extra payloads, steal info, and carry out different malicious actions. The Hidden rootkit gives stealth by hiding payloads, stopping course of termination, and stopping detection.

Based on Netskope, the marketing campaign seems to have been orchestrated by the China-linked Silver Fox hacking group, primarily based on the employed TTPs, the usage of faux web sites and installers for common Chinese language software program, and focusing on.

Silver Fox has been round for at the very least one 12 months and a few researchers imagine it might be an APT masquerading as a cybercrime group. 

Associated: Hackers Abuse ConnectWise to Conceal Malware

Associated: SonicWall Warns of Trojanized NetExtender Stealing Person Info

Associated: Godfather Android Trojan Creates Sandbox on Contaminated Gadgets

Associated: Microsoft Warns of Node.js Abuse for Malware Supply

Security Week News Tags:Chinese, Hackers, RAT, Rootkit, Target, Users

Post navigation

Previous Post: Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability
Next Post: RevEng.ai Raises $4.15 Million to Secure Software Supply Chain

Related Posts

Chrome Sandbox Escape Earns Researcher 0,000 Chrome Sandbox Escape Earns Researcher $250,000 Security Week News
1.1 Million Unique Records Identified in Allianz Life Data Leak 1.1 Million Unique Records Identified in Allianz Life Data Leak Security Week News
China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear Security Week News
CISA Highlights SharePoint Security Vulnerability Exploitation CISA Highlights SharePoint Security Vulnerability Exploitation Security Week News
LLMs in Attacker Crosshairs, Warns Threat Intel Firm LLMs in Attacker Crosshairs, Warns Threat Intel Firm Security Week News
Japan, Britain to Boost Cybersecurity and Critical Minerals Cooperation as China’s Influence Grows Japan, Britain to Boost Cybersecurity and Critical Minerals Cooperation as China’s Influence Grows Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark