Thursday, May 8, 2025
HomeCyber AttackIndustrial Organizations Under Siege: Chinese Hackers Wield Advanced FatalRAT Malware

Industrial Organizations Under Siege: Chinese Hackers Wield Advanced FatalRAT Malware

Published on

SIEM as a Service

Follow Us on Google News

A recent investigation by Kaspersky ICS CERT has uncovered a sophisticated cyberattack targeting industrial organizations across the Asia-Pacific region, particularly those in Taiwan, Malaysia, China, Japan, Thailand, South Korea, Singapore, the Philippines, Vietnam, and Hong Kong.

The attackers are using a highly advanced version of the FatalRAT malware, delivered through a complex multi-stage payload framework designed to evade detection.

Sophisticated Infection Chain

The malware is typically introduced via zip archives disguised as invoices or tax filing applications, distributed through email, WeChat, and Telegram.

- Advertisement - Google News

These archives contain a first-stage loader packed with tools like UPX, AsProtect, or NSPack to complicate detection and analysis.

Once executed, the loader contacts Youdao Cloud Notes to download a dynamically updated list of links to configurators and second-stage loaders.

FatalRAT Malware
 Infection chain

According to Kaspersky ICS CERT Report, this approach allows the attackers to frequently change command and control (C2) addresses and payload locations, making it challenging for security systems to track and block the malware.

The configurator module, named Before.dll, collects system information and sends it to the attacker’s server.

It also downloads configuration data from another Youdao note, which contains encrypted settings for the malware’s operation.

The second-stage loader, Fangao.dll, uses this configuration to download and execute the FatalRAT payload.

To maintain persistence, the malware exploits legitimate software like PureCodec and DriverAssistant, employing techniques such as DLL sideloading to hide in legitimate process memory.

Advanced Malware Capabilities

FatalRAT is equipped with extensive capabilities, including keylogging, system information collection, and the ability to execute commands from its C2 server.

It can manipulate system settings, delete data, and even corrupt the Master Boot Record (MBR).

The malware also checks for indicators of virtual machines or sandbox environments, terminating itself if detected to prevent analysis.

The attackers leverage legitimate cloud services like myqcloud and Youdao Cloud Notes to host their infrastructure, further complicating detection efforts.

While the exact group behind these attacks remains unclear, indicators suggest involvement by a Chinese-speaking threat actor.

The use of Chinese language interfaces, exploitation of regional cloud services, and specific targeting of Chinese-speaking targets support this hypothesis.

To mitigate these threats, organizations are advised to implement robust security measures, including regular software updates, two-factor authentication, and application whitelisting.

Enhancing network segmentation and using advanced threat detection solutions can also help protect against such sophisticated attacks.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...