Site icon Cyber Pross

Hackers Deploy Fake VPN and Browser Installers to Spread Winos 4.0 Malware

Cybersecurity researchers have uncovered a sophisticated malware campaign that leverages fake software installers, masquerading as popular tools like LetsVPN and QQ Browser, to distribute the Winos 4.0 malware framework.


🧩 The Catena Loader: A Stealthy Delivery Mechanism

The campaign, first identified by Rapid7 in February 2025, employs a multi-stage, memory-resident loader known as Catena. This loader utilizes embedded shellcode and configuration-switching logic to stage payloads like Winos 4.0 entirely in memory, effectively evading traditional antivirus tools.

“Once installed, it quietly connects to attacker-controlled servers—mostly hosted in Hong Kong—to receive follow-up instructions or additional malware,” noted security researchers Anna Širokova and Ivan Feigl.


🎯 Targeted Regions and Threat Actors

The attacks predominantly focus on Chinese-speaking environments, indicating a strategic approach by a highly capable threat actor. The Winos 4.0 malware, also known as ValleyRAT, was initially documented by Trend Micro in June 2024 and has been linked to a threat cluster tracked as Void Arachne or Silver Fox.


🕹️ Evolving Tactics: From Browsers to Gaming Applications

Subsequent campaigns have expanded their reach by leveraging gaming-related applications, such as installation tools and optimization utilities, to trick users into installing the malware. A notable attack wave in February 2025 targeted entities in Taiwan through phishing emails impersonating the National Taxation Bureau.


🛠️ Technical Breakdown: Infection Chain and Persistence

The infection chain, dubbed Catena, involves:

The malware communicates with hard-coded command-and-control (C2) infrastructure over TCP port 18856 and HTTPS port 443. Persistence is achieved by registering scheduled tasks that execute weeks after the initial compromise.


🧠 Language Checks and Tactical Shifts

Interestingly, the malware includes a check for Chinese language settings on the system. However, it proceeds with execution even if the condition isn’t met, suggesting an unfinished feature. In April 2025, Rapid7 observed a tactical shift, with changes in the Catena execution chain and added features to evade antivirus detection.


🔍 Indicators of Compromise (IOCs)

Security professionals should be vigilant for the following IOCs:


🛡️ Mitigation Strategies

To protect against such threats:


📚 Further Reading

👉 Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware


Stay informed and stay safe. Cyber threats are evolving—ensure your defenses evolve too.

Exit mobile version