Tuesday, March 25, 2025
HomeCyber Security NewsMalware-Infected Signal, Line, and Gmail Apps Alter System Defenses

Malware-Infected Signal, Line, and Gmail Apps Alter System Defenses

Published on

SIEM as a Service

Follow Us on Google News

A recent cybersecurity analysis has uncovered a campaign targeting Chinese-speaking users through malicious installers of popular applications such as Signal, Line, and Gmail.

These backdoored executables exploit manipulated search engine results to lure unsuspecting users into downloading malware-laden files.

The attackers employ deceptive tactics, including fake download pages hosted on unrelated domains, to distribute these compromised applications.

Sophisticated Techniques Evade Detection

Unlike traditional phishing schemes that mimic official URLs, this campaign operates through generic and unrelated domain names such as “ggyxx.wenxinzhineng[.]top” and “linoo.wenxinzhineng[.]top.”

These domains are hosted on centralized infrastructure located on Alibaba servers in Hong Kong.

The attackers rely on search engine optimization (SEO) poisoning to direct users to these fraudulent pages, which deliver ZIP files containing executable malware.

Upon execution, the malware initiates a multi-step process that includes temporary file extraction, process injection, and system modification.

Notably, it uses PowerShell commands to disable Windows Defender by excluding the entire C:\ drive from scanning.

This tactic ensures that the malware can operate undetected while compromising the system.

Targeted Applications

The fake download pages impersonate widely used applications:

  • Signal: The spoofed site “z1.xiaowu[.]pw” delivers a ZIP file named “Sriguoe-i4.zip,” which contains a Windows executable disguised as a Signal installer.
Gmail Apps
Fake page for Signal.
  • Line: Two domains, “linoo.wenxinzhineng[.]top” and “linegut[.]com,” host similar malicious pages delivering files like “Levinech-en.zip.”
  • Gmail: The fraudulent site “ggyxx.wenxinzhineng[.]top” masquerades as a login page but instead prompts users to download “Goongeurut.zip,” which installs a fake Gmail notifier application.
Gmail Apps
Screenshot of fake Gmail login page.

According to the Hunt researchers, the malware follows a consistent execution pattern.

After initial execution from the user’s desktop, it drops temporary files in the AppData directory and injects malicious processes into deeply nested paths.

It also establishes outbound connections to command-and-control (C2) servers for potential data exfiltration or further instructions.

Key indicators include:

  • Domains: Hosted on Alibaba servers with IP addresses like 47.243.192[.]62.
  • File Names: ZIP archives such as “Sriguoe-i4.zip” and executables like “svrnezcm.exe.”
  • Network Activity: DNS queries to domains like “zhzcm.star1ine[.]com” and outbound TCP connections to IPs like 8.210.9[.]4.

This campaign highlights the evolving sophistication of malware distribution tactics targeting specific user demographics.

By leveraging non-branded domains and manipulating search engines, attackers aim to cast a wide net without directly impersonating official vendors.

Security professionals and users are urged to verify software sources rigorously and remain vigilant against untrusted download sites.

Enhanced threat detection measures can help mitigate risks posed by such advanced malware campaigns.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

In 2024, the number of users affected by mobile banking malware skyrocketed to nearly...

Researchers Compare Malware Development in Rust vs C and C++

Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in...

ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems

Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed...

IDT Corporation Partners with AccuKnox for Zero Trust Runtime IoT/Edge Security

Menlo Park, United States, March 25th, 2025, CyberNewsWireFinTech and Communications Leader, IDT Corporation partners with AccuKnox to deploy...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques

In 2024, the number of users affected by mobile banking malware skyrocketed to nearly...

Researchers Compare Malware Development in Rust vs C and C++

Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in...

ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems

Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed...