Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Massive Winos 4.0 Campaigns Target Taiwan

0
Medium
Published: Sun Feb 22 2026 (02/22/2026, 02:50:09 UTC)
Source: AlienVault OTX General

Description

A series of targeted phishing campaigns in Taiwan have been observed disseminating Winos 4.0 (ValleyRat) malware and associated plugins. The attacks exploit local business processes using themes like tax audits and e-invoices. The campaigns employ various techniques including malicious LNK files, DLL sideloading, and Bring Your Own Vulnerable Driver (BYOVD) attacks. The malware utilizes UAC bypassing, driver loading, and process termination to evade detection and disable security software. The attacks are attributed to a subgroup of the Silver Fox APT, showing sophisticated localization and evolving evasion techniques. The campaigns have been active since at least January 2026, using consistent infrastructure and development identifiers.

AI-Powered Analysis

AILast updated: 02/23/2026, 10:01:36 UTC

Technical Analysis

The Winos 4.0 campaign represents a sophisticated malware operation primarily targeting Taiwanese organizations through phishing emails themed around local business processes such as tax audits and electronic invoicing. The malware, also known as ValleyRat, employs multiple advanced infection and evasion techniques. Initial infection vectors include malicious LNK shortcut files that execute payloads when opened, and DLL sideloading, which abuses legitimate Windows binaries to load malicious DLLs stealthily. Additionally, the campaign uses Bring Your Own Vulnerable Driver (BYOVD) attacks, where attackers load vulnerable or malicious drivers to gain kernel-level privileges, bypassing security controls like UAC. Once inside the system, Winos 4.0 uses driver loading to maintain persistence and process termination techniques to disable antivirus and endpoint detection and response (EDR) tools, complicating detection and remediation efforts. The campaign is attributed to a subgroup of the Silver Fox APT, known for targeting East Asian entities with localized social engineering lures and evolving malware capabilities. The attackers maintain consistent infrastructure, including domains and IP addresses, and reuse development identifiers, indicating a well-resourced and persistent threat actor. The campaign has been active since at least January 2026 and continues to evolve, posing ongoing risks to targeted organizations. Indicators of compromise include specific file hashes, IP addresses, and domains linked to the campaign, which can be used for detection and blocking. Despite no known public exploits, the campaign's complexity and targeted approach make it a significant threat to Taiwan's business and governmental sectors.

Potential Impact

The Winos 4.0 campaign poses substantial risks to organizations in Taiwan, particularly those in finance, government, and sectors reliant on electronic invoicing and tax-related processes. Successful compromise can lead to unauthorized access to sensitive financial and business data, intellectual property theft, and potential disruption of critical business operations. The malware's ability to bypass UAC and disable security software increases the likelihood of prolonged undetected presence, enabling attackers to conduct espionage, data exfiltration, or deploy additional payloads such as ransomware. The use of BYOVD attacks elevates the threat by granting kernel-level access, which can undermine system integrity and complicate incident response. The localized phishing themes increase the success rate of social engineering, making employees more susceptible to infection. Globally, organizations with business ties to Taiwan or those using similar business processes could face indirect risks if attackers expand targeting. The campaign's persistence and sophistication highlight the threat actor's capability to adapt and maintain long-term access, potentially leading to significant financial and reputational damage for affected entities.

Mitigation Recommendations

Organizations should implement targeted defenses against phishing by training employees specifically on recognizing localized social engineering tactics related to tax audits and e-invoices. Deploy advanced email filtering solutions that inspect attachments and URLs for malicious LNK files and archive formats like .rar and .7z. Monitor and restrict the execution of LNK files and unknown DLLs, especially those loaded via sideloading techniques. Employ application whitelisting to prevent unauthorized driver loading and use endpoint detection tools capable of identifying BYOVD attack patterns and kernel-level anomalies. Regularly audit and harden User Account Control (UAC) settings to reduce bypass risks. Maintain updated threat intelligence feeds to block known malicious domains, IPs, and file hashes associated with this campaign. Conduct frequent security assessments focusing on persistence mechanisms and process termination behaviors indicative of malware activity. Implement network segmentation to limit lateral movement and monitor for unusual outbound traffic to suspicious infrastructure. Finally, establish incident response plans that include forensic capabilities to detect and remediate advanced persistent threats with kernel-level access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.fortinet.com/blog/threat-research/massive-winos-40-campaigns-target-taiwan"]
Adversary
Silver Fox
Pulse Id
699a6ee1425f8f4a6e583f31
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash156f31b37ee0d6e7f87cdc94dcd2d3b084b2e15da08bd8588e17d6bdc43159fe
hash64ee7a2e6259286311c8ba1c7b6d30e1e52fe78befcfd1b71b291c788f3e3e6a

Ip

ValueDescriptionCopy
ip154.91.64.246

Url

ValueDescriptionCopy
urlhttp://taxfnat.tw/
urlhttp://zbyq.cn/Set^up^64.e^x^e
urlhttps://njhwuyklw.com/
urlhttps://sdfw2026024.tos-cn-shanghai.volces.com/E-Invoice.rar
urlhttps://sdfw2026024.tos-cn-shanghai.volces.com/E-Invoice.rar.
urlhttps://twmoi2002.tos-cn-shanghai.volces.com/E-Invoice.rar
urlhttps://twtaxgo.cn/uploads/20260129/taxIs_RX3001.7z
urlhttps://twtaxgo.cn/uploads/20260129/taxIs_RX3001.7z.

Domain

ValueDescriptionCopy
domainbqdrzbyq.cn
domainetaxtw.cn
domainlmaxjuyh.cn
domainnjhwuyklw.com
domaintaukeny.com
domaintaxfnat.tw
domaintaxhub.tw
domaintaxpro.tw
domaintkooyvff.cn
domaintwswsb.cn
domaintwtaxgo.cn
domainzbyq.cn
domainzju.edu.cn
domainsdfw2026024.tos-cn-shanghai.volces.com
domaintwmoi2002.tos-cn-shanghai.volces.com

Threat ID: 699c21ebbe58cf853b6b6adf

Added to database: 2/23/2026, 9:46:19 AM

Last enriched: 2/23/2026, 10:01:36 AM

Last updated: 2/24/2026, 1:51:12 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats