Monday, April 27, 2026

Malicious Multilingual ZIP Files Strike Banks and Government Offices

A sophisticated phishing campaign leveraging multilingual ZIP file lures has emerged across East and Southeast Asia, targeting government institutions and financial organizations with unprecedented coordination.

Security researchers utilizing Hunt.io’s AttackCaptureâ„¢ and HuntSQLâ„¢ datasets have uncovered an interconnected network of 28 malicious webpages operating across three language clusters, revealing a scalable, automation-driven infrastructure designed to deliver staged malware payloads disguised as legitimate bureaucratic documents.

The campaign represents a significant evolution in regional cyber threats, demonstrating how adversaries are recycling identical web components—including scripts, page titles, and file naming conventions—across Chinese, Japanese, and English-language variants.

This multilingual approach enables threat actors to cast a wider net across Taiwan, Hong Kong, Japan, Indonesia, Malaysia, and other Southeast Asian nations, adapting their social engineering tactics to match local administrative and financial contexts.

Analysis of the campaign infrastructure reveals a remarkably consistent technical pattern. All identified webpages employ identical backend logic utilizing download.php and visitor_log.php scripts, indicating centralized deployment through an automated toolkit or builder.

The hosting infrastructure predominantly relies on Kaopu Cloud HK Limited (AS138915), with servers distributed across Tokyo, Singapore, Hong Kong, Thailand, and Cambodia—strategically positioned to support regional operations.

The Chinese-language cluster consists of 12 webpages delivering ZIP and RAR archives with filenames mimicking tax invoices, import-export declarations, financial confirmation forms, and regulatory documents written in Traditional Chinese.

These pages primarily target users in Taiwan and Hong Kong, employing titles such as “文件下載” (File Download) to establish legitimacy.

The English-language cluster, also comprising 12 webpages, targets Southeast Asian corporate environments with filenames referencing tax filing documents and employee position adjustments, while four Japanese-language pages complete the operation with lures focused on salary system reviews and National Tax Agency notices.

Researchers identified the campaign by pivoting from known malicious domains documented in earlier Fortinet threat intelligence reports.

Starting with reference domain “zxp0010w[.]vip,” investigators used HuntSQL queries to correlate similar page structures, titles, and scripting patterns across regions.

Phishing domain "zxp0010w.vip" observed on June 4, 2025.
Phishing domain “zxp0010w.vip” observed on June 4, 2025.

This methodology revealed that domains sharing characteristics like .vip, .sbs, .cc, and .cn extensions consistently delivered the same malicious framework with only superficial language and filename modifications.

Evolution From Earlier Campaigns

The current operation builds upon phishing waves documented throughout 2024 and early 2025, when threat actors initially deployed Winos 4.0 malware in Taiwan before expanding to distribute the HoldingHands malware family across broader Asian territories.

Open port analysis reveals SSH (port 22) running OpenBSD OpenSSH 8.0, first observed in January 2023 and still active as of October 2025, indicating a long-lived server potentially used for persistent infrastructure or remote administration.

The domain "zxp0010w[.]vip" resolves to IP address 38.54.88[.]44.
The domain “zxp0010w[.]vip” resolves to IP address 38.54.88[.]44.

Earlier campaigns relied on cloud hosting services like Tencent Cloud, but operators have since transitioned to custom domain infrastructure embedding regional markers such as “tw” for Taiwan and “jp” for Japan.

The shift demonstrates increasing sophistication in operational security and infrastructure management.

By maintaining multiple language-specific clusters under unified backend control, adversaries can simultaneously test social engineering themes, rotate domains rapidly to evade blocklists, and maintain persistent access to compromised environments across diverse geographic and linguistic boundaries.

Security teams should implement proactive domain blocking for discovered indicators and monitor for emerging domains following similar naming patterns.

Pivoting on the title "File Download" enabled the identification of 11 additional domains.
Pivoting on the title “File Download” enabled the identification of 11 additional domains.

Organizations can leverage Hunt.io’s continuous monitoring capabilities to query for newly observed phishing pages containing characteristic download.php or visitor_log.php endpoints, enabling early detection of infrastructure reuse.

Network defenders should configure mail gateways to detect ZIP and RAR attachments with HR, tax, or finance-themed filenames, particularly those arriving in unexpected languages or contexts.

User awareness training remains critical, emphasizing recognition of fake official document downloads and limiting execution privileges for scripts and compressed files from untrusted sources.

These multilingual campaigns underscore the importance of cross-regional threat intelligence sharing to combat adversaries operating at scale across linguistic and geographic boundaries.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

Mayura Kathir
Mayura Kathirhttps://gbhackers.com/
Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.

Hot this week

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep Web The deep web, invisible web, or...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything...

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an...

Web Server Penetration Testing Checklist – 2026

Web server pentesting is performed under three significant categories: identity,...

Hackers Exploit Agent ID Administrator Role to Hijack Service Principals

A severe scoping vulnerability was recently discovered in Microsoft...

GPT-5.5 Bio Bug Bounty Program Aims to Improve AI Safety and Performance

OpenAI has officially launched the GPT-5.5 Bio Bug Bounty...

Claude Desktop Reportedly Adds Browser Access Bridge for Chromium Browsers

A detailed cybersecurity report published by privacy expert Alexander...

Fake CAPTCHA Scam Triggers Costly SMS Fraud

Hackers are abusing fake CAPTCHA pages to run a...

Hackers Exploit Cisco Firepower N-Day Flaws for Unauthorized Access

A state-sponsored threat actor known as UAT-4356 is actively exploiting known...

Hackers Exploit Pastebin PowerShell Script to Hijack Telegram Sessions

Hackers are experimenting with a new Telegram‑focused session stealer...

Xiongmai IP Camera Flaw Lets Attackers Bypass Authentication

A critical security vulnerability has been identified in Hangzhou...

Void Dokkaebi Hackers Spread Malware Through Fake Job Interviews

Void Dokkaebi, also known as Famous Chollima, is expanding...

Related Articles

Recent News