Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » PNGPlug Loader delivers ValleyRAT malware via fake program installers
Global Security

PNGPlug Loader delivers ValleyRAT malware via fake program installers

AdminBy AdminJanuary 21, 2025No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 21, 2025Ravi LakshmananCyber ​​Attack / Windows Security

Cybersecurity researchers are drawing attention to a series of cyberattacks targeting Chinese-speaking regions such as Hong Kong, Taiwan and mainland China using a known malware called ValleyRAT.

The attacks use a multi-stage loader called PNGPlug to deliver the ValleyRAT payload, Intezer said in a technical report published last week.

The chain of infection begins with a phishing page designed to encourage victims to download a malicious Microsoft Installer (MSI) package disguised as legitimate software.

Cyber ​​security

Once executed, the installer deploys a benign application to avoid suspicion and also stealthily extracts an encrypted archive containing malware.

“The MSI package exploits the CustomAction feature of Windows Installer, which allows it to execute malicious code, including launching an embedded malicious DLL that decrypts the archive (all.zip) using the hardcoded password ‘hello202411’ to extract the core components of the malware,” the security researcher said. Nicole Fishbein said.

These include a fake DLL (“libcef.dll”), a legitimate application (“down.exe”) used as a cloak to hide malicious activity, and two payload files masquerading as PNG images (“aut.png” and “view.png”).

The main purpose of the DLL loader, PNGPlug, is to prepare the environment for the main malware to run by injecting “aut.png” and “view.png” into memory to configure security by modifying the Windows registry and executing ValleyRAT, respectively.

ValleyRAT, found in the wild as of 2023 is a Remote Access Trojan (RAT) capable of providing attackers with unauthorized access and control over infected machines. The latest versions of malware are available features included for taking screenshots and clearing Windows event logs.

It is believed to be linked to a threat group called Silver foxwhich also shares tactical overlaps with another named activity cluster Void of Arachne due to the use of a command and control (C&C) system is called Windows 4.0.

Cyber ​​security

The campaign is unique in that it targets a Chinese-speaking demographic and uses software baits to activate the chain of attacks.

“Equally striking is the sophisticated use by attackers of legitimate software as a malware delivery mechanism, seamlessly blending malicious activities with seemingly benign programs,” said Fishbein.

“The adaptability of the PNGPlug loader further increases the threat as its modular design allows it to be adapted for multiple companies.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.