{"id":4429,"date":"2025-05-25T09:13:35","date_gmt":"2025-05-25T09:13:35","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/25\/hackers-use-fake-vpn-and-browser-nsis-installers-to-deliver-winos-4-0-malware\/"},"modified":"2025-05-25T09:13:35","modified_gmt":"2025-05-25T09:13:35","slug":"hackers-use-fake-vpn-and-browser-nsis-installers-to-deliver-winos-4-0-malware","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/25\/hackers-use-fake-vpn-and-browser-nsis-installers-to-deliver-winos-4-0-malware\/","title":{"rendered":"Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware"},"content":{"rendered":"<p>\u200bCybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework.<br \/>\nThe campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena.<br \/>\n&#8220;Catena uses embedded shellcode and configuration switching logic to stage\u00a0Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework.<br \/>\nThe campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena.<br \/>\n&#8220;Catena uses embedded shellcode and configuration switching logic to stage\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena. &#8220;Catena uses embedded shellcode and configuration switching logic to&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/25\/hackers-use-fake-vpn-and-browser-nsis-installers-to-deliver-winos-4-0-malware\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4430,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4429"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4429"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4429\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4430"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}