Massive Winos 4.0 Campaigns Target Taiwan
A series of targeted phishing campaigns in Taiwan have been observed disseminating Winos 4.0 (ValleyRat) malware and associated plugins. The attacks exploit local business processes using themes like tax audits and e-invoices. The campaigns employ various techniques including malicious LNK files, DLL sideloading, and Bring Your Own Vulnerable Driver (BYOVD) attacks. The malware utilizes UAC bypassing, driver loading, and process termination to evade detection and disable security software. The attacks are attributed to a subgroup of the Silver Fox APT, showing sophisticated localization and evolving evasion techniques. The campaigns have been active since at least January 2026, using consistent infrastructure and development identifiers.
AI Analysis
Technical Summary
The Winos 4.0 campaign represents a sophisticated malware operation primarily targeting Taiwanese organizations through phishing emails themed around local business processes such as tax audits and electronic invoicing. The malware, also known as ValleyRat, employs multiple advanced infection and evasion techniques. Initial infection vectors include malicious LNK shortcut files that execute payloads when opened, and DLL sideloading, which abuses legitimate Windows binaries to load malicious DLLs stealthily. Additionally, the campaign uses Bring Your Own Vulnerable Driver (BYOVD) attacks, where attackers load vulnerable or malicious drivers to gain kernel-level privileges, bypassing security controls like UAC. Once inside the system, Winos 4.0 uses driver loading to maintain persistence and process termination techniques to disable antivirus and endpoint detection and response (EDR) tools, complicating detection and remediation efforts. The campaign is attributed to a subgroup of the Silver Fox APT, known for targeting East Asian entities with localized social engineering lures and evolving malware capabilities. The attackers maintain consistent infrastructure, including domains and IP addresses, and reuse development identifiers, indicating a well-resourced and persistent threat actor. The campaign has been active since at least January 2026 and continues to evolve, posing ongoing risks to targeted organizations. Indicators of compromise include specific file hashes, IP addresses, and domains linked to the campaign, which can be used for detection and blocking. Despite no known public exploits, the campaign's complexity and targeted approach make it a significant threat to Taiwan's business and governmental sectors.
Potential Impact
The Winos 4.0 campaign poses substantial risks to organizations in Taiwan, particularly those in finance, government, and sectors reliant on electronic invoicing and tax-related processes. Successful compromise can lead to unauthorized access to sensitive financial and business data, intellectual property theft, and potential disruption of critical business operations. The malware's ability to bypass UAC and disable security software increases the likelihood of prolonged undetected presence, enabling attackers to conduct espionage, data exfiltration, or deploy additional payloads such as ransomware. The use of BYOVD attacks elevates the threat by granting kernel-level access, which can undermine system integrity and complicate incident response. The localized phishing themes increase the success rate of social engineering, making employees more susceptible to infection. Globally, organizations with business ties to Taiwan or those using similar business processes could face indirect risks if attackers expand targeting. The campaign's persistence and sophistication highlight the threat actor's capability to adapt and maintain long-term access, potentially leading to significant financial and reputational damage for affected entities.
Mitigation Recommendations
Organizations should implement targeted defenses against phishing by training employees specifically on recognizing localized social engineering tactics related to tax audits and e-invoices. Deploy advanced email filtering solutions that inspect attachments and URLs for malicious LNK files and archive formats like .rar and .7z. Monitor and restrict the execution of LNK files and unknown DLLs, especially those loaded via sideloading techniques. Employ application whitelisting to prevent unauthorized driver loading and use endpoint detection tools capable of identifying BYOVD attack patterns and kernel-level anomalies. Regularly audit and harden User Account Control (UAC) settings to reduce bypass risks. Maintain updated threat intelligence feeds to block known malicious domains, IPs, and file hashes associated with this campaign. Conduct frequent security assessments focusing on persistence mechanisms and process termination behaviors indicative of malware activity. Implement network segmentation to limit lateral movement and monitor for unusual outbound traffic to suspicious infrastructure. Finally, establish incident response plans that include forensic capabilities to detect and remediate advanced persistent threats with kernel-level access.
Affected Countries
Taiwan, China, United States, Japan, South Korea
Indicators of Compromise
- hash: 156f31b37ee0d6e7f87cdc94dcd2d3b084b2e15da08bd8588e17d6bdc43159fe
- hash: 64ee7a2e6259286311c8ba1c7b6d30e1e52fe78befcfd1b71b291c788f3e3e6a
- ip: 154.91.64.246
- url: http://taxfnat.tw/
- url: http://zbyq.cn/Set^up^64.e^x^e
- url: https://njhwuyklw.com/
- url: https://sdfw2026024.tos-cn-shanghai.volces.com/E-Invoice.rar
- url: https://sdfw2026024.tos-cn-shanghai.volces.com/E-Invoice.rar.
- url: https://twmoi2002.tos-cn-shanghai.volces.com/E-Invoice.rar
- url: https://twtaxgo.cn/uploads/20260129/taxIs_RX3001.7z
- url: https://twtaxgo.cn/uploads/20260129/taxIs_RX3001.7z.
- domain: bqdrzbyq.cn
- domain: etaxtw.cn
- domain: lmaxjuyh.cn
- domain: njhwuyklw.com
- domain: taukeny.com
- domain: taxfnat.tw
- domain: taxhub.tw
- domain: taxpro.tw
- domain: tkooyvff.cn
- domain: twswsb.cn
- domain: twtaxgo.cn
- domain: zbyq.cn
- domain: zju.edu.cn
- domain: sdfw2026024.tos-cn-shanghai.volces.com
- domain: twmoi2002.tos-cn-shanghai.volces.com
Massive Winos 4.0 Campaigns Target Taiwan
Description
A series of targeted phishing campaigns in Taiwan have been observed disseminating Winos 4.0 (ValleyRat) malware and associated plugins. The attacks exploit local business processes using themes like tax audits and e-invoices. The campaigns employ various techniques including malicious LNK files, DLL sideloading, and Bring Your Own Vulnerable Driver (BYOVD) attacks. The malware utilizes UAC bypassing, driver loading, and process termination to evade detection and disable security software. The attacks are attributed to a subgroup of the Silver Fox APT, showing sophisticated localization and evolving evasion techniques. The campaigns have been active since at least January 2026, using consistent infrastructure and development identifiers.
AI-Powered Analysis
Technical Analysis
The Winos 4.0 campaign represents a sophisticated malware operation primarily targeting Taiwanese organizations through phishing emails themed around local business processes such as tax audits and electronic invoicing. The malware, also known as ValleyRat, employs multiple advanced infection and evasion techniques. Initial infection vectors include malicious LNK shortcut files that execute payloads when opened, and DLL sideloading, which abuses legitimate Windows binaries to load malicious DLLs stealthily. Additionally, the campaign uses Bring Your Own Vulnerable Driver (BYOVD) attacks, where attackers load vulnerable or malicious drivers to gain kernel-level privileges, bypassing security controls like UAC. Once inside the system, Winos 4.0 uses driver loading to maintain persistence and process termination techniques to disable antivirus and endpoint detection and response (EDR) tools, complicating detection and remediation efforts. The campaign is attributed to a subgroup of the Silver Fox APT, known for targeting East Asian entities with localized social engineering lures and evolving malware capabilities. The attackers maintain consistent infrastructure, including domains and IP addresses, and reuse development identifiers, indicating a well-resourced and persistent threat actor. The campaign has been active since at least January 2026 and continues to evolve, posing ongoing risks to targeted organizations. Indicators of compromise include specific file hashes, IP addresses, and domains linked to the campaign, which can be used for detection and blocking. Despite no known public exploits, the campaign's complexity and targeted approach make it a significant threat to Taiwan's business and governmental sectors.
Potential Impact
The Winos 4.0 campaign poses substantial risks to organizations in Taiwan, particularly those in finance, government, and sectors reliant on electronic invoicing and tax-related processes. Successful compromise can lead to unauthorized access to sensitive financial and business data, intellectual property theft, and potential disruption of critical business operations. The malware's ability to bypass UAC and disable security software increases the likelihood of prolonged undetected presence, enabling attackers to conduct espionage, data exfiltration, or deploy additional payloads such as ransomware. The use of BYOVD attacks elevates the threat by granting kernel-level access, which can undermine system integrity and complicate incident response. The localized phishing themes increase the success rate of social engineering, making employees more susceptible to infection. Globally, organizations with business ties to Taiwan or those using similar business processes could face indirect risks if attackers expand targeting. The campaign's persistence and sophistication highlight the threat actor's capability to adapt and maintain long-term access, potentially leading to significant financial and reputational damage for affected entities.
Mitigation Recommendations
Organizations should implement targeted defenses against phishing by training employees specifically on recognizing localized social engineering tactics related to tax audits and e-invoices. Deploy advanced email filtering solutions that inspect attachments and URLs for malicious LNK files and archive formats like .rar and .7z. Monitor and restrict the execution of LNK files and unknown DLLs, especially those loaded via sideloading techniques. Employ application whitelisting to prevent unauthorized driver loading and use endpoint detection tools capable of identifying BYOVD attack patterns and kernel-level anomalies. Regularly audit and harden User Account Control (UAC) settings to reduce bypass risks. Maintain updated threat intelligence feeds to block known malicious domains, IPs, and file hashes associated with this campaign. Conduct frequent security assessments focusing on persistence mechanisms and process termination behaviors indicative of malware activity. Implement network segmentation to limit lateral movement and monitor for unusual outbound traffic to suspicious infrastructure. Finally, establish incident response plans that include forensic capabilities to detect and remediate advanced persistent threats with kernel-level access.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.fortinet.com/blog/threat-research/massive-winos-40-campaigns-target-taiwan"]
- Adversary
- Silver Fox
- Pulse Id
- 699a6ee1425f8f4a6e583f31
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash156f31b37ee0d6e7f87cdc94dcd2d3b084b2e15da08bd8588e17d6bdc43159fe | — | |
hash64ee7a2e6259286311c8ba1c7b6d30e1e52fe78befcfd1b71b291c788f3e3e6a | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip154.91.64.246 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://taxfnat.tw/ | — | |
urlhttp://zbyq.cn/Set^up^64.e^x^e | — | |
urlhttps://njhwuyklw.com/ | — | |
urlhttps://sdfw2026024.tos-cn-shanghai.volces.com/E-Invoice.rar | — | |
urlhttps://sdfw2026024.tos-cn-shanghai.volces.com/E-Invoice.rar. | — | |
urlhttps://twmoi2002.tos-cn-shanghai.volces.com/E-Invoice.rar | — | |
urlhttps://twtaxgo.cn/uploads/20260129/taxIs_RX3001.7z | — | |
urlhttps://twtaxgo.cn/uploads/20260129/taxIs_RX3001.7z. | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainbqdrzbyq.cn | — | |
domainetaxtw.cn | — | |
domainlmaxjuyh.cn | — | |
domainnjhwuyklw.com | — | |
domaintaukeny.com | — | |
domaintaxfnat.tw | — | |
domaintaxhub.tw | — | |
domaintaxpro.tw | — | |
domaintkooyvff.cn | — | |
domaintwswsb.cn | — | |
domaintwtaxgo.cn | — | |
domainzbyq.cn | — | |
domainzju.edu.cn | — | |
domainsdfw2026024.tos-cn-shanghai.volces.com | — | |
domaintwmoi2002.tos-cn-shanghai.volces.com | — |
Threat ID: 699c21ebbe58cf853b6b6adf
Added to database: 2/23/2026, 9:46:19 AM
Last enriched: 2/23/2026, 10:01:36 AM
Last updated: 2/24/2026, 1:51:12 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-23
MediumMaltrail IOC for 2026-02-22
MediumFake Huorong security site infects users with ValleyRAT
MediumMaltrail IOC for 2026-02-23
MediumAnother day, another malicious JPEG, (Mon, Feb 23rd)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.