Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT
This report details two interconnected malware campaigns targeting Chinese-speaking users in 2025, using large-scale brand impersonation to deliver Gh0st RAT variants. The first campaign, active from February to March, mimicked three brands across over 2,000 domains. The second campaign, starting in May, impersonated over 40 applications with more sophisticated infection chains. Both campaigns used cloud infrastructure for payload delivery and DLL side-loading for evasion. The adversary demonstrated an evolving operational playbook, advancing from simple droppers to complex multi-stage infections. The campaigns' infrastructure remained active for months, indicating a persistent and well-resourced threat actor focused on Chinese-speaking targets globally.
Pulse ID: 6918168f887ca57be0147adb
Pulse Link: https://otx.alienvault.com/pulse/6918168f887ca57be0147adb
Pulse Author: AlienVault
Created: 2025-11-15 05:58:39
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Chinese #Cloud #CyberSecurity #Doppelganger #InfoSec #Malware #Mimic #NATO #OTX #OpenThreatExchange #RAT #RCE #bot #AlienVault




KEXP

