Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Critical SaaS Security Do’s and Don’ts: Insights from 493 Companies

June 29, 2025

FBI Alerts: Scattered Spider Targets Airlines with Social Engineering Tactics

June 28, 2025

Zyxel Networks Simplifies Secure Remote Connectivity

June 28, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » ‘HoldingHands’ Acts Like a Pickpocket With Taiwan Orgs
Cyber Risk

‘HoldingHands’ Acts Like a Pickpocket With Taiwan Orgs

Staff WriterBy Staff WriterJune 17, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


A threat actor is targeting organizations in Taiwan in a sophisticated and evolving campaign to steal data for likely use in future attacks.

The attackers are delivering malware through phishing emails impersonating Taiwan’s National Taxation Bureau and other government entities, using themes related to taxes, pensions, and public services.

Convincing Phishing Lures

The emails contain a malicious zip file that launches a multistage infection chain when opened. One of the final payloads is HoldingHands (aka Gh0stBins), a remote access Trojan (RAT) capable of data exfiltration and surveillance, according to Fortinet, which has been tracking the campaign since January. In some instances, the adversary has used email content that includes a picture with a hyperlink that, when clicked, leads to a malware download on the victim system.

The embedded files in the zip file include a malicious dynamic link library called “dokan2.dll” that facilitates the deployment of HoldingHands. The malware stealthily decrypts and executes a second-stage payload hidden in a text file called dxpi.txt that, in turn, serves as a configuration file for the malware and executes installation and privilege escalation steps on a compromised machine. Another file embedded in the zip archive is MsgDb.dat, which implements multiple command-and-control (C2) tasks for the malware.

Related:‘Water Curse’ Targets Infosec Pros via Poisoned GitHub Repositories

“The attack chain comprises numerous snippets of shellcode and loaders, making the attack flow complex,” Fortinet security researcher Pei Han Liao said in a blog post this week. “The purpose of these samples is to execute a malicious payload that accesses a C2 server to receive further instructions.”

Data that the adversary has been harvesting includes user information, IP address, computer name, and system-related information such as operating system and version, system architecture, CPU frequency, processor count, memory size, and registry values.

In the initial stages, the attacker used tax-themed phishing emails to distribute Winos 4.0, a malware toolkit with multiple components for enabling keylogging, screenshot capture, clipboard monitoring, and data exfiltration. In the subsequent months, the attacker has added HoldingHands and another data stealer called Gh0stCringe to the mix. Both these malware tools have capabilities that are similar to Winos 4.0 and support functions like keylogging, file theft, remote control, and the ability to deploy additional payloads.

Part of a Broader Trend

Campaigns like the one Fortinet has been tracking are part of a growing pattern of targeted cyberattacks in Asia, often tied to geopolitical tensions. In many of these attacks, threat actors — frequently suspected of being state-backed — have leveraged highly tailored phishing lures to infiltrate networks in strategic sectors. Earlier this year, Taiwan’s National Security Bureau (NSB) reported a near doubling, to 2.4 million, in the number of daily attacks on the Taiwanese government in 2024. Many of the attacks originated from China-backed groups and focused heavily on government and telecommunications organizations. More recently, Symantec reported Chinese threat actor Lotus Panda using custom malware to infect systems belonging to government organizations across much of Southeast Asia in 2024.

Related:CISA Reveals ‘Pattern’ of Ransomware Attacks Against SimpleHelp RMM

Stephen Kowski, field chief technology officer (CTO) at SlashNext Email Security+, described the ongoing campaign in Taiwan as well-planned and executed. “The fact that they’re using multiple malware variants — Winos 4.0, HoldingHands RAT, and Gh0stCringe — in coordinated waves tells us this is a sophisticated, well-resourced operation that’s playing the long game,” he said in an emailed statement. “What’s particularly concerning is how they’re using legitimate-looking zip files and multistage infection chains to slip past traditional email security that only checks attachments at the gateway.”

Related:Cyberattacks on Humanitarian Orgs Jump Worldwide

Such attacks highlight the need for organizations to implement capabilities for analyzing the behavior and intent behind links and attachments in emails, in real time, he added.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCyEx Names Wes Alford EVP to Elevate Client Service Deliver
Next Article TaxOff Exploits Chrome Zero-Day to Deploy Trinper Backdoor
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Charming Kitten APT Tries Spying on Israeli Cyber Experts

June 26, 2025

What Does It Mean for Cyber?

June 25, 2025

China’s ‘LapDogs’ Network Thrives on Backdoored SOHO Devices

June 24, 2025
Leave A Reply Cancel Reply

Latest Posts

FBI Alerts: Scattered Spider Targets Airlines with Social Engineering Tactics

June 28, 20250 Views

From Malicious to Mindful: The Evolution of Browser Tools

June 28, 20250 Views

OneClik Malware: Unleashing Threats in the Energy Sector

June 27, 20250 Views

Scattered Spider Hackers Target Aviation and Transportation Firms

June 27, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical SaaS Security Do’s and Don’ts: Insights from 493 Companies

June 29, 2025

FBI Alerts: Scattered Spider Targets Airlines with Social Engineering Tactics

June 28, 2025

Zyxel Networks Simplifies Secure Remote Connectivity

June 28, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.