CyberHappenings logo
☰

Track cybersecurity events as they unfold. Sourced timelines, daily updates. Fast, privacy‑respecting. No ads, no tracking.

SEO Poisoning Campaign Targeting Chinese Users with HiddenGh0st, Winos, and kkRAT

First reported
Last updated
πŸ“° 1 unique sources, 1 articles

Summary

Hide β–²

A search engine optimization (SEO) poisoning campaign targets Chinese-speaking users to distribute malware. The campaign uses fake software sites and lookalike domains to trick users into downloading malware, including HiddenGh0st, Winos, and a new remote access trojan (RAT) called kkRAT. The malware is delivered through trojanized installers that include both legitimate and malicious payloads, making detection difficult. The campaign exploits popular software search queries and uses GitHub Pages for hosting malicious sites. The malware employs various techniques to evade detection and achieve persistence, including anti-analysis checks, TypeLib COM hijacking, and the Bring Your Own Vulnerable Driver (BYOVD) technique. The malware can perform command-and-control (C2) communication, system monitoring, and data exfiltration. The campaign has been active since at least May 2025 and involves multiple malware families.

Timeline

  1. 15.09.2025 08:47 πŸ“° 1 articles Β· ⏱ 14h ago

    SEO Poisoning Campaign Targeting Chinese Users with HiddenGh0st, Winos, and kkRAT

    A search engine optimization (SEO) poisoning campaign targets Chinese-speaking users to distribute malware. The campaign uses fake software sites and lookalike domains to trick users into downloading malware, including HiddenGh0st, Winos, and a new remote access trojan (RAT) called kkRAT. The malware is delivered through trojanized installers that include both legitimate and malicious payloads, making detection difficult. The campaign exploits popular software search queries and uses GitHub Pages for hosting malicious sites. The malware employs various techniques to evade detection and achieve persistence, including anti-analysis checks, TypeLib COM hijacking, and the Bring Your Own Vulnerable Driver (BYOVD) technique. The malware can perform command-and-control (C2) communication, system monitoring, and data exfiltration. The campaign has been active since at least May 2025 and involves multiple malware families.

    Show sources

Information Snippets