Friday, February 21, 2025
HomeCyber Security NewsMalware-Infected Signal, Line, and Gmail Apps Alter System Defenses

Malware-Infected Signal, Line, and Gmail Apps Alter System Defenses

Published on

SIEM as a Service

Follow Us on Google News

A recent cybersecurity analysis has uncovered a campaign targeting Chinese-speaking users through malicious installers of popular applications such as Signal, Line, and Gmail.

These backdoored executables exploit manipulated search engine results to lure unsuspecting users into downloading malware-laden files.

The attackers employ deceptive tactics, including fake download pages hosted on unrelated domains, to distribute these compromised applications.

Sophisticated Techniques Evade Detection

Unlike traditional phishing schemes that mimic official URLs, this campaign operates through generic and unrelated domain names such as “ggyxx.wenxinzhineng[.]top” and “linoo.wenxinzhineng[.]top.”

These domains are hosted on centralized infrastructure located on Alibaba servers in Hong Kong.

The attackers rely on search engine optimization (SEO) poisoning to direct users to these fraudulent pages, which deliver ZIP files containing executable malware.

Upon execution, the malware initiates a multi-step process that includes temporary file extraction, process injection, and system modification.

Notably, it uses PowerShell commands to disable Windows Defender by excluding the entire C:\ drive from scanning.

This tactic ensures that the malware can operate undetected while compromising the system.

Targeted Applications

The fake download pages impersonate widely used applications:

  • Signal: The spoofed site “z1.xiaowu[.]pw” delivers a ZIP file named “Sriguoe-i4.zip,” which contains a Windows executable disguised as a Signal installer.
Gmail Apps
Fake page for Signal.
  • Line: Two domains, “linoo.wenxinzhineng[.]top” and “linegut[.]com,” host similar malicious pages delivering files like “Levinech-en.zip.”
  • Gmail: The fraudulent site “ggyxx.wenxinzhineng[.]top” masquerades as a login page but instead prompts users to download “Goongeurut.zip,” which installs a fake Gmail notifier application.
Gmail Apps
Screenshot of fake Gmail login page.

According to the Hunt researchers, the malware follows a consistent execution pattern.

After initial execution from the user’s desktop, it drops temporary files in the AppData directory and injects malicious processes into deeply nested paths.

It also establishes outbound connections to command-and-control (C2) servers for potential data exfiltration or further instructions.

Key indicators include:

  • Domains: Hosted on Alibaba servers with IP addresses like 47.243.192[.]62.
  • File Names: ZIP archives such as “Sriguoe-i4.zip” and executables like “svrnezcm.exe.”
  • Network Activity: DNS queries to domains like “zhzcm.star1ine[.]com” and outbound TCP connections to IPs like 8.210.9[.]4.

This campaign highlights the evolving sophistication of malware distribution tactics targeting specific user demographics.

By leveraging non-branded domains and manipulating search engines, attackers aim to cast a wide net without directly impersonating official vendors.

Security professionals and users are urged to verify software sources rigorously and remain vigilant against untrusted download sites.

Enhanced threat detection measures can help mitigate risks posed by such advanced malware campaigns.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...