Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft

April 17, 2026

CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks

April 17, 2026

Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links

April 17, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » ‘HoldingHands’ Acts Like a Pickpocket With Taiwan Orgs
Uncategorized

‘HoldingHands’ Acts Like a Pickpocket With Taiwan Orgs

Staff WriterBy Staff WriterJune 17, 2025No Comments4 Mins Read1 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


A threat actor is targeting organizations in Taiwan in a sophisticated and evolving campaign to steal data for likely use in future attacks.

The attackers are delivering malware through phishing emails impersonating Taiwan’s National Taxation Bureau and other government entities, using themes related to taxes, pensions, and public services.

Convincing Phishing Lures

The emails contain a malicious zip file that launches a multistage infection chain when opened. One of the final payloads is HoldingHands (aka Gh0stBins), a remote access Trojan (RAT) capable of data exfiltration and surveillance, according to Fortinet, which has been tracking the campaign since January. In some instances, the adversary has used email content that includes a picture with a hyperlink that, when clicked, leads to a malware download on the victim system.

The embedded files in the zip file include a malicious dynamic link library called “dokan2.dll” that facilitates the deployment of HoldingHands. The malware stealthily decrypts and executes a second-stage payload hidden in a text file called dxpi.txt that, in turn, serves as a configuration file for the malware and executes installation and privilege escalation steps on a compromised machine. Another file embedded in the zip archive is MsgDb.dat, which implements multiple command-and-control (C2) tasks for the malware.

Related:‘Water Curse’ Targets Infosec Pros via Poisoned GitHub Repositories

“The attack chain comprises numerous snippets of shellcode and loaders, making the attack flow complex,” Fortinet security researcher Pei Han Liao said in a blog post this week. “The purpose of these samples is to execute a malicious payload that accesses a C2 server to receive further instructions.”

Data that the adversary has been harvesting includes user information, IP address, computer name, and system-related information such as operating system and version, system architecture, CPU frequency, processor count, memory size, and registry values.

In the initial stages, the attacker used tax-themed phishing emails to distribute Winos 4.0, a malware toolkit with multiple components for enabling keylogging, screenshot capture, clipboard monitoring, and data exfiltration. In the subsequent months, the attacker has added HoldingHands and another data stealer called Gh0stCringe to the mix. Both these malware tools have capabilities that are similar to Winos 4.0 and support functions like keylogging, file theft, remote control, and the ability to deploy additional payloads.

Part of a Broader Trend

Campaigns like the one Fortinet has been tracking are part of a growing pattern of targeted cyberattacks in Asia, often tied to geopolitical tensions. In many of these attacks, threat actors — frequently suspected of being state-backed — have leveraged highly tailored phishing lures to infiltrate networks in strategic sectors. Earlier this year, Taiwan’s National Security Bureau (NSB) reported a near doubling, to 2.4 million, in the number of daily attacks on the Taiwanese government in 2024. Many of the attacks originated from China-backed groups and focused heavily on government and telecommunications organizations. More recently, Symantec reported Chinese threat actor Lotus Panda using custom malware to infect systems belonging to government organizations across much of Southeast Asia in 2024.

Related:CISA Reveals ‘Pattern’ of Ransomware Attacks Against SimpleHelp RMM

Stephen Kowski, field chief technology officer (CTO) at SlashNext Email Security+, described the ongoing campaign in Taiwan as well-planned and executed. “The fact that they’re using multiple malware variants — Winos 4.0, HoldingHands RAT, and Gh0stCringe — in coordinated waves tells us this is a sophisticated, well-resourced operation that’s playing the long game,” he said in an emailed statement. “What’s particularly concerning is how they’re using legitimate-looking zip files and multistage infection chains to slip past traditional email security that only checks attachments at the gateway.”

Related:Cyberattacks on Humanitarian Orgs Jump Worldwide

Such attacks highlight the need for organizations to implement capabilities for analyzing the behavior and intent behind links and attachments in emails, in real time, he added.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCyEx Names Wes Alford EVP to Elevate Client Service Deliver
Next Article TaxOff Exploits Chrome Zero-Day to Deploy Trinper Backdoor
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Swedish Government Links Pro-Russian Group to Heating Plant Cyberattack

April 15, 2026

Critical Flaws Fixed in April Patch Tuesday: Urgent Updates for SAP, Adobe, Microsoft, Fortinet & More

April 15, 2026

FBI & Indonesian Police Crush $20M W3LL Phishing Network

April 13, 2026
Leave A Reply Cancel Reply

Latest Posts

Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft

April 17, 2026

CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks

April 17, 2026

Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links

April 17, 2026

Emerson Integrates OPSWAT to Elevate OT Patch Management in Ovation Platform

April 17, 2026
Don't Miss

Swedish Government Links Pro-Russian Group to Heating Plant Cyberattack

By Staff WriterApril 15, 2026

Top Highlights Sweden publicly links a pro-Russian group to a failed cyberattack on a heating…

Critical Flaws Fixed in April Patch Tuesday: Urgent Updates for SAP, Adobe, Microsoft, Fortinet & More

April 15, 2026

FBI & Indonesian Police Crush $20M W3LL Phishing Network

April 13, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft
  • CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks
  • Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links
  • Emerson Integrates OPSWAT to Elevate OT Patch Management in Ovation Platform
  • EU’s New Age Verification App Can Be Cracked in Just 2 Minutes, Experts Warn
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hackers Exploit ATHR to Launch Large-Scale AI-Powered Vishing and Credential Theft

April 17, 2026

CISA Alerts on ActiveMQ Input Validation Flaw Exploited in Attacks

April 17, 2026

Payouts King Emerges Amid New Ransomware Threat Tied to BlackBasta Affiliate Links

April 17, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Unlock the Power of Free WormGPT: Harnessing DeepSeek, Gemini, and Kimi-K2 AI Models

November 27, 202521 Views

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.