Winos 4.0: How Gaming Apps can be Used to Infect your Computer

Winos is an advanced malware with several components handling distinct functions that collectively give the attacker complete control over the victim’s machine. The malware is similar to CobaltStrike and Sliver, both of which are legitimate tools which can be used for malicious purposes and have been favourites of cybercriminals for a long time now. Most prominently, Winos has been used in the Sliver Fox campaign which is suspected to be linked to the Chinese Government.

To fully grasp how Winos 4.0 infiltrates and compromises your computer, it is important to understand the series of steps it takes from initial infection to complete control. This sequence, known as the attack chain, outlines how the malware is delivered, executed, and ultimately used to exploit your system. Let’s break down each stage to see how seemingly harmless gaming applications can become gateways for such advanced threats.

Speed and optimisation are one thing all gamers are obsessed with, and you might relate to this yourself. Video games are generally heavy-duty applications that consume a lot of processing power, making a computer slow down significantly. In order to overcome this, many gamers look for methods to increase their computers’ gaming performance. This Winos 4.0 malware campaign preys on the need for optimised gaming experiences by creating fake applications that claim to speed up your computer by optimising its processing power but in reality are mere vehicles for the delivery of malware to unsuspecting victims. Additionally, the campaign makes use of installation tools in the same manner enabling them to bypass basic security checks, increasing the likelihood of successful infection.

Winos's Attack Chain Illustration
Winos’s Attack Chain

Be it the optimisation or the installation tools, once the user runs the application, it performs a series of file retrievals from a remote server which are then decoded to finally yield the malware. The malware will then establish persistence as its first action i.e. make sure it can reactivate itself if the machine is restarted and also in some cases reinstall itself in case it is kicked out and then establish contact with the Command and Control(C2) server which is used by the attacker to control what it does.

As mentioned before, Winos 4.0 is not just a malware but rather a framework similar to Cobalt Strike and Sliver. Here are some features that it offers:

To determine if your system has been infected with Winos 4.0 malware, you can follow several steps that involve checking for unusual behaviour, examining specific files, and utilizing security tools. Here’s how to effectively check for an infection:

In conclusion, the Winos 4.0 malware campaign demonstrates how seemingly innocent gaming apps and optimization tools can be repurposed to infect users’ computers. While this malware specifically targets Chinese-speaking users, it employs common tactics that anyone could encounter, such as posing as legitimate software, establishing hidden network connections, and using deceptive file names. Recognizing the risks associated with downloading unverified apps—especially those promising performance boosts or game enhancements—can help us stay safer online. By staying alert to unusual system behaviour, using trusted sources for downloads, and keeping security software up-to-date, we can protect our devices from threats like Winos 4.0. Ultimately, awareness and careful downloading habits are key to defending against malware disguised as helpful gaming tools.