Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Memory Market Mayhem: RAM Prices Skyrocket and Could “10x” by 2026, Analysts Warn

    January 14, 2026

    Replit CEO: AI Outputs Often “Generic Slop”, Urges Better Engineering and “Vibe Coding”

    January 14, 2026

    Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

    January 14, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI News
    Facebook X (Twitter) Instagram Pinterest VKontakte
    TallwireTallwire
    • Tech

      Replit CEO: AI Outputs Often “Generic Slop”, Urges Better Engineering and “Vibe Coding”

      January 14, 2026

      Memory Market Mayhem: RAM Prices Skyrocket and Could “10x” by 2026, Analysts Warn

      January 14, 2026

      New Test-Time Training Lets Models Keep Learning Without Costs Exploding

      January 14, 2026

      Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

      January 14, 2026

      Smart Ring Shake-Up: Oura’s Patent Win Shifts U.S. Market Landscape

      January 13, 2026
    • AI News
    TallwireTallwire
    Home»Tech»Malicious Campaign Uses SEO Poisoning & GitHub Pages to Deliver RATs HiddenGh0st, Winos, kkRAT to Chinese-Speaking Users
    Tech

    Malicious Campaign Uses SEO Poisoning & GitHub Pages to Deliver RATs HiddenGh0st, Winos, kkRAT to Chinese-Speaking Users

    Updated:December 25, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Malicious Campaign Uses SEO Poisoning & GitHub Pages to Deliver RATs HiddenGh0st, Winos, kkRAT to Chinese-Speaking Users
    Malicious Campaign Uses SEO Poisoning & GitHub Pages to Deliver RATs HiddenGh0st, Winos, kkRAT to Chinese-Speaking Users
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In recent reports, cybersecurity researchers from Fortinet FortiGuard Labs and Zscaler ThreatLabz have uncovered a coordinated SEO poisoning campaign targeting Chinese-speaking Windows users. Attackers registered look-alike domains mimicking popular software sites and manipulated search engine rankings via SEO plugins to push fake download pages for apps like DeepL Translate, Chrome, Signal, Telegram, WhatsApp, and WPS Office. These spoofed pages deliver trojanised installers that include RATs (Remote Access Trojans) such as HiddenGh0st (a variant of Gh0st RAT), Winos, FatalRAT, and a newer threat called kkRAT. Unlike purely fake sites, some of these malicious installers are even hosted via GitHub Pages, leveraging the platform’s credibility. The RATs are designed for stealth: evading detection (including disabling or bypassing antivirus tools), carrying out crypto-wallet hijacking via clipboard manipulation, monitoring user activity, and enabling remote control. 

    Sources: Hacker News, Fortinet

    Key Takeaways

    – Attackers are combining SEO poisoning with lookalike domains to lure users into downloading fake, malicious installers, making use of small character substitutions to mimic legitimate sites. 

    – Multiple Remote Access Trojans (HiddenGh0st, Winos, FatalRAT, kkRAT) are being deployed, often packaged within seemingly legitimate software installers; these RATs are capable of disabling antivirus tools, hijacking crypto wallets, logging keystrokes, monitoring screens, and maintaining persistence. 

    – GitHub Pages is being abused as a hosting platform for malware-laden content due to its trust status; this allows malicious actors to host phishing and trojanised content in a place many users consider safer, complicating detection and takedown efforts. 

    In-Depth

    In the shadowy corners of the web, a sophisticated malware campaign is underway, blending technical cunning with psychological manipulation to ensnare unsuspecting users—particularly among Chinese-speaking Windows users. The modus operandi leverages SEO poisoning: attackers create fake sites that closely resemble legitimate software download pages, manipulate search results through SEO tools and plugins, and use lookalike domain names with tiny typographical tweaks. When users search for trusted apps—DeepL Translate, Chrome, Signal, etc.—they may be directed to these malicious pages instead of the real ones. The download offered appears authentic but inside lurks a remote access trojan (RAT) such as HiddenGh0st, Winos, FatalRAT, or the newer kkRAT.

    What makes kkRAT especially dangerous is its blend of features: it deploys mechanisms to disable or bypass antivirus tools (some targeting popular ones like 360 Total Security), monitors clipboard content (for replacing cryptocurrency addresses), and offers remote monitoring tools and persistence. Researchers observed that even when antivirus software is present, the malware uses sophisticated evasion techniques—checking for sandbox or virtual machine environments, enforcing sleep or time-based checks, and using DLL loaders to mask actions. Perhaps most worrying is the use of GitHub Pages as a delivery vector: content hosted there inherits an aura of legitimacy, making detection harder and users more likely to trust it. The GitHub accounts used in these campaigns have often been terminated post-detection, but damage can be done in the moments before takedown.

    Defensive posture must adapt: users should always double-check domain names (watch for subtle misspellings), prefer official websites or verified sources for downloads, keep antivirus definitions and systems updated, and consider using sandboxed or virtual environments for testing new software. Meanwhile, platforms like GitHub and search engines will need to bolster detection of fraudulent content and poisoned SEO to limit exposure.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMajor Shift for Data Rights as EU Data Act Became Enforceable September 12, 2025
    Next Article Managers Increasingly Let AI Call the Shots on Hiring, Promotions, and Firings

    Related Posts

    Replit CEO: AI Outputs Often “Generic Slop”, Urges Better Engineering and “Vibe Coding”

    January 14, 2026

    Memory Market Mayhem: RAM Prices Skyrocket and Could “10x” by 2026, Analysts Warn

    January 14, 2026

    New Test-Time Training Lets Models Keep Learning Without Costs Exploding

    January 14, 2026

    Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

    January 14, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Replit CEO: AI Outputs Often “Generic Slop”, Urges Better Engineering and “Vibe Coding”

    January 14, 2026

    Memory Market Mayhem: RAM Prices Skyrocket and Could “10x” by 2026, Analysts Warn

    January 14, 2026

    New Test-Time Training Lets Models Keep Learning Without Costs Exploding

    January 14, 2026

    Ralph Wiggum Plugin Emerges as a Trending Autonomous AI Coding Tool in Claude

    January 14, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) Instagram Pinterest YouTube
    • Tech
    • AI News
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.