As Chinese users endeavor to download widely-used browsers and communication software, they find themselves at the mercy of increasingly sophisticated malware campaigns. These cyber assaults leverage spoofed download pages, typosquatted domains and SEO poisoning to lure users into downloading malware-laden software.
Recent investigations by Fortinet FortiGuard Labs and Zscaler ThreatLabz have spotlighted the deceptive tactics employed by these campaigns. Fake download pages purporting to offer legitimate software like DeepL Translate, Google Chrome, Signal, Telegram, and WPS Office have been cleverly manipulated to appear genuine. The result? Users download installers that are, in reality, Trojan horses.
Remote Access Trojans: A Closer Look
The campaigns have been found distributing several known Remote Access Trojans, including HiddenGh0st, Winos, FatalRAT, and a newly identified threat known as kkRAT. The latter stands out for its resemblance to other robust malware like Gh0st RAT. Engineered for stealth and resilience, kkRAT compresses data before applying an encryption layer on its network traffic, expertly evading detection.
- Clipboard Hijacking and Cryptography: One of kkRAT's cunning tricks is its capability to perform clipboard hijacking, particularly targeting cryptocurrency transactions by substituting wallet addresses.
- Remote Monitoring: Additionally, kkRAT is designed to deploy remote monitoring tools such as Sunlogin and GotoHTTP, providing attackers with extensive control and oversight abilities.
- Process Termination: Another versatile trait of kkRAT is its ability to terminate processes, disabling vital antivirus components before further executing its tasks.
Moreover, in their quest for increased reach and impact, attackers have also misused GitHub Pages, a popular web hosting service, to perpetrate phishing through seemingly legitimate pages. However, once these breaches were identified, the offending GitHub account was promptly shuttered.
Analysis traces some facets of this comprehensive malware campaign back to initial activity observed in May. The emergence of these sophisticated methods underscores the increasing creativity and technical prowess employed by bad actors within the realm of cybersecurity. As threats evolve, so must the defensive measures undertaken to safeguard users from such insidious malware.



