A sophisticated Chinese threat actor campaign has emerged as one of the most persistent malware distribution operations targeting Chinese-speaking communities worldwide.Since June 2023, this ongoing campaign has established an extensive infrastructure comprising more than 2,800 malicious domains specifically designed to deliver Windows-targeted malware to individuals and entities both within China and internationally.The threat actors operate with remarkable consistency during Chinese business hours, employing a multi-faceted approach that leverages fake application download sites, deceptive software update prompts, and [spoofed login](https://cybersecuritynews.com/defend-against-phishing-kit-attacks/) pages for popular services.Their targets include users of marketing applications, business sales platforms, and cryptocurrency-related services, demonstrating a clear focus on financially motivated cybercrime and [credential theft](https://cybersecuritynews.com/credential-theft-risks/) operations.The campaign’s scope and persistence have drawn significant attention from security researchers.DomainTools analysts [identified](https://dti.domaintools.com/chinese-malware-delivery-domains-part-iii/) that as of June 2025, 266 domains from over 850 created since December 2024 remained actively distributing malware, highlighting the operation’s sustained infrastructure and continuous evolution.Recent operational changes indicate the threat actors are adapting to defensive measures by implementing anti-automation code, reducing reliance on tracking services like Baidu and Facebook, and distributing their infrastructure across more servers to avoid detection.These modifications suggest a mature understanding of cybersecurity countermeasures and a commitment to maintaining operational effectiveness.**Multi-Stage Infection Mechanism**———————————–The malware delivery process demonstrates sophisticated technical implementation through a multi-stage infection chain. .webp) Fake Gmail Login (Source — Domaintools)Analysis of the domain `googeyxvot[.]top` reveals the actors’ use of JavaScript [obfuscation](https://cybersecuritynews.com/obfuscation-techniques-to-evade-anti-virus-detection/) to conceal download URLs and trigger fake browser compatibility errors that prompt malicious updates..webp) Multiple JavaScript files are employed to obfuscate the download URL (Source — Domaintools)When users interact with these deceptive sites, they receive a ZIP file containing an MSI installer.The file `flashcenter_pl_xr_rb_165892.19.zip` (SHA256: 7705ac81e004546b7dacf47531b830e31d3113e217adeef1f8dd6ea6f4b8e59b) contains the executable `svchost.13.exe`, which functions as a downloader component.This downloader retrieves encrypted payloads from command-and-control servers, specifically from URLs like `https://ffsup-s42.oduuu[.]com/uploads%2F4398%2F2025%2F06%2F617.txt`.The final payload employs [XOR encryption](https://cybersecuritynews.com/powerful-ddos-malware-attack/) with the key `0x25` to decode and execute the embedded PE file, demonstrating the campaign’s technical sophistication in evading detection while maintaining operational simplicity for widespread deployment across their extensive domain infrastructure.**Boost detection, reduce alert fatigue, accelerate response; all with an interactive sandbox built for security teams –> [Try ANY.RUN Now](https://any.run/demo?utm_source=csn&utm_medium=article&utm_campaign=top3_ciso_challenges&utm_content=demo_1&utm_term=160725)**The post [Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware](https://cybersecuritynews.com/chinese-threat-actors-using-2800-malicious-domains-to-deliver-windows-specific-malware/) appeared first on [Cyber Security News](https://cybersecuritynews.com).
Related Tags:
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 52 – Finance And Insurance
NAICS: 518 – Computing Infrastructure Providers
Data Processing
Web Hosting
Related Services
NAICS: 523 – Securities
Commodity Contracts
Other Financial Investments And Related Activities
NAICS: 522 – Credit Intermediation And Related Activities
NAICS: 51 – Information
Blog: Cybersecurity News
Deobfuscate/Decode Files or Information
Ingress Tool Transfer
Associated Indicators:
ffsup-s42.oduuu.com
7705AC81E004546B7DACF47531B830E31D3113E217ADEEF1F8DD6EA6F4B8E59B
googeyxvot.top


