Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

Parkinsond

Level 62
Thread author
Verified
Well-known
Dec 6, 2023
5,188
14,807
6,069
Winos 4.0 (aka ValleyRAT) was first publicly documented by Trend Micro in June 2024 as used in attacks targeting Chinese-speaking users by means of malicious Windows Installer (MSI) files for VPN apps. The activity has been attributed to a threat cluster it tracks as Void Arachne, which is also referred to as Silver Fox.

Subsequent campaigns distributing the malware have leveraged gaming-related applications like installation tools, speed boosters, and optimization utilities as lures to trick users into installing it. Another attack wave detailed in February 2025 targeted entities in Taiwan via phishing emails that purported to be from the National Taxation Bureau.

Rapid7 said all the artifacts flagged in February 2025 relied on NSIS installers bundled with signed decoy apps, shellcode embedded in ".ini" files, and reflective DLL injection to covertly maintain persistence on infected hosts and avoid detection. The entire infection chain has been given the moniker Catena.

Persistence on the host is achieved by registering scheduled tasks that are executed weeks after the initial compromise. While the malware features an explicit check to look for Chinese language settings on the system, it still proceeds with the execution even if that's not the case.

In the revamped attack sequence, the NSIS installer disguises itself as a setup file for LetsVPN and runs a PowerShell command that adds Microsoft Defender exclusions for all drives (C:\ to Z:\). It then drops additional payloads, including an executable that takes a snapshot of running processes and checks for processes related to 360 Total Security, an antivirus product developed by Chinese vendor Qihoo 360.

 
Last edited by a moderator:
The most important thing for attackers is convincing users that they should try the advertised software. Without this, the attacks noted in the OP would be simply blocked on execution by Windows SmartScreen (unsigned, low prevalence, poor reputation) - no need for extra security.
Unfortunately, many users cannot resist trying lures and tend to ignore possible dangers. The temptation is stronger than the caution, so they often manually bypass SmartScreen or the AV alerts.😢
 
The most important thing for attackers is convincing users that they should try the advertised software. Without this, the attacks noted in the OP would be simply blocked on execution by Windows SmartScreen (unsigned, low prevalence, poor reputation) - no need for extra security.
Unfortunately, many users cannot resist trying lures and tend to ignore possible dangers. The temptation is stronger than the caution, so they often manually bypass SmartScreen or the AV alerts.😢
Curiosity killed the 🐱
 
It all comes down to user education, I'm sure most of us downloaded warez and cracked software at some point and then wondered why out PCs were so slow and F####D and didn't work correctly. Same thing with Chinese Vpn apps, off course they will be backdoored but people want freedom and want to access the western web so they install the Vpn apps.
 
It all comes down to user education, I'm sure most of us downloaded warez and cracked software at some point and then wondered why out PCs were so slow and F####D and didn't work correctly. Same thing with Chinese Vpn apps, off course they will be backdoored but people want freedom and want to access the western web so they install the Vpn apps.

Yes, curiosity, temptation, and freedom are important for most people.
It is recommended to be particularly cautious and knowledgeable when something on the web has increased our curiosity, temptation, or a need for freedom. :)