Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The Gh0st RAT Trojan targets Chinese Windows users via a spoofed Chrome site
Global Security

The Gh0st RAT Trojan targets Chinese Windows users via a spoofed Chrome site

AdminBy AdminJuly 29, 2024No Comments3 Mins Read
Gh0st RAT Trojan
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 29, 2024Information hallCyber ​​Security / Cyber ​​Espionage

Trojan Gh0st RAT

The remote access trojan, known as Gh0st RAT, was spotted as part of an “evasion dropper” called Gh0stGambit. scheme of loading on the auto insurance targeting Chinese-speaking Windows users.

These infections originate from a spoofed website (“chrome-web(.)com”) that serves malicious installer packages under the guise of the Google Chrome browser, indicating that users searching for software on the Internet are being targeted.

Gh0st RAT is a old malware which has been seen in the wild since 2008, manifesting itself in various variants over the years in campaigns mostly orchestrated by China’s cyber espionage groups.

There were also some iterations of the Trojan previously deployed by infiltrating poorly secured instances of MS SQL Server, using it as a conduit to install a hidden open source rootkit.

Cyber ​​security

According to cybersecurity firm eSentire, which revealed the latest activity, targeting Chinese-speaking users, is based on “the use of Chinese-language web lures and Chinese applications designed to steal data and evade malware protection.”

The MSI installer downloaded from the fake website contains two files: a legitimate Chrome setup executable and a malicious installer (“WindowsProgram.msi”), the latter of which is used to run the shellcode responsible for loading Gh0stGambit.

The dropper, in turn, checks for security software (such as 360 Safe Guard and Microsoft Defender Antivirus) before contacting the command-and-control (C2) server to retrieve the Gh0st RAT.

“Gh0st RAT is written in C++ and has many features, including process termination, file deletion, audio and screenshot capture, remote command execution, keylogging, data theft, registry, file and directory hiding through rootkit capabilities and more,” eSentire said .

It is also capable of removing Mimikatz, enabling RDP on compromised hosts, accessing account IDs associated with Tencent QQ, clearing Windows event logs, and erasing data from 360 Secure Browser, QQ Browser, and Sogou Explorer.

The Canadian company said the artifact matches a variant of the Gh0st RAT tracked by the AhnLab Security Intelligence Center (ASEC) under the alias HiddenGh0st.

“Over the past few years, the Gh0st RAT has been widely used and modified by APTs and criminal groups,” eSentire said. “Recent findings highlight the distribution of this threat through downloads, tricking users into downloading a malicious Chrome installer from a fraudulent website.”

“The continued success of auto-pumps reinforces the need for ongoing safety education and awareness programs.”

Broadcom-owned Symantec has reported an increase in phishing campaigns that are likely using large language models (LLM) to create malicious PowerShell and HTML code used to download multiple bootloaders and steals.

The emails contained “code used to download various payloads, including Rhadomantis, NetSupport RAT, CleanUpLoader (broom, oyster), ModiLoader (DBatLoader), LokiBotand Come here (H-Worm),” security researchers Nguyen Haang Giang and Yi Helen Zhang said. “Analysis of the scripts used to deliver the malware in these attacks shows that they were created using LLM.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.