Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Home/Threats/Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
Threats

Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices

The Chinese-linked threat group known as Silver Fox is actively conducting a calculated phishing campaign. This operation targets employees across multiple countries, deceiving them into opening what...

Jennifer sherman
Jennifer sherman
May 5, 2026 4 Min Read
0 0

The Chinese-linked threat group known as Silver Fox is actively conducting a calculated phishing campaign. This operation targets employees across multiple countries, deceiving them into opening what appear to be official tax authority notices.

The emails, disguised as legitimate government communications, led victims to download a chain of malware that ultimately installed both the known ValleyRAT backdoor and a newly discovered Python-based implant called ABCDoor.

The campaign was first spotted in December 2025, when a wave of phishing emails impersonated the Indian tax service.

Weeks later, in January 2026, the same group launched a nearly identical operation against organizations in Russia.

Both waves used emails formatted as tax audit notices or warnings about alleged tax violations, pushing recipients to download an archive file described as a “list of tax violations.”

The attacks hit organizations across industrial, consulting, retail, and transportation sectors, with over 1,600 malicious emails recorded between early January and early February 2026 alone.

Securelist analysts identified and attributed this activity to the Silver Fox threat group. Their investigation revealed that in addition to deploying ValleyRAT, the attackers were also delivering a brand new, previously undocumented backdoor through a custom ValleyRAT plugin, which they named ABCDoor based on the “abc” third-level domain pattern consistently seen across its command-and-control (C2) addresses.

Retrospective analysis confirmed that ABCDoor had been part of Silver Fox’s toolkit since at least late 2024 and had been used in real attacks from the first quarter of 2025.

What makes this campaign particularly dangerous is not just the malware used, but the deliberate social engineering behind it.

Tax notices are taken seriously by employees, and the urgency created by a supposed government audit is enough to push people into clicking links without careful thought.

The PDF attachments in the phishing emails contained download links instead of embedded malicious code, a deliberate tactic to slip past email security gateways that scan for direct malware attachments.

How the Infection Chain Works: From Fake PDF to Full System Takeover

Once the victim clicks the download link in the phishing PDF, they retrieve a compressed archive containing a modified Rust-based loader called RustSL.

Attack chain (Source - Securelist)
Attack chain (Source – Securelist)

Silver Fox pulled this loader’s source code from a public GitHub repository and made significant modifications to it.

The customized version, referred to as Silver Fox RustSL, includes a new module called steganography.rs that handles payload unpacking, as well as a guard.rs module that performs environment checks and country-based geofencing to ensure the malware only runs on devices in targeted countries, including India, Russia, Indonesia, South Africa, Cambodia, and later Japan.

Screenshot of the Description from the RustSL Loader GitHub Project (Source - Securelist)
Screenshot of the Description from the RustSL Loader GitHub Project (Source – Securelist)

The loader is disguised with a PDF or Excel file icon to avoid raising suspicion. When the user runs it, RustSL loads an encrypted payload that functions as shellcode. This shellcode then downloads an encrypted ValleyRAT module called the “Online module” from the attackers’ server.

The Online module loads the core ValleyRAT component, the “Login module,” which manages C2 communication, executes commands, and downloads further payloads. One such additional payload is a custom ValleyRAT plugin named 保86.dll, which acts as a downloader for ABCDoor.

Contents of the 111.zip Archive (Source - Securelist)
Contents of the 111.zip Archive (Source – Securelist)

ABCDoor is a Python-based backdoor compiled with Cython 3.0.7, which helps mask its source code.

It is extracted alongside a bundled Python environment and a copy of ffmpeg.exe, a legitimate audio and video tool that the malware repurposes for screen capture and broadcasting.

Once active, ABCDoor establishes persistence in two ways: by writing itself to the Windows registry Run key and by creating a scheduled task named “AppClient” that restarts it every minute.

It disguises its installation path under C:ProgramDataTailscale, mimicking the name of the legitimate Tailscale VPN utility to blend into the system and mislead analysts.

Silver Fox RustSL also introduces a technique called Phantom Persistence, which intercepts system shutdown signals, aborts the shutdown, and triggers a reboot that re-executes the loader, ensuring the malware survives restarts.

Running within a legitimate pythonw.exe process, ABCDoor is able to stay hidden for extended periods while quietly collecting screen data, exfiltrating clipboard contents, managing files, and emulating mouse and keyboard input on the victim’s machine.

Organizations are strongly advised to train employees to verify emails claiming to be from tax authorities before downloading any attachments or clicking embedded links.

Email security solutions should be configured to flag and analyze PDF files containing external download links, not just direct file attachments.

Monitoring for unusual registry modifications, scheduled tasks named “AppClient,” the creation of directories at C:ProgramDataTailscale, and outbound connections to third-level “abc” subdomains can help detect this threat early.

Any suspicious use of pythonw.exe as a persistent process or unexplained ffmpeg.exe activity on endpoints should also be treated as a potential indicator of ABCDoor infection.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Cerberus Stalkerware Abuses Google Play for Leverages Accessibility

Next Post

ScarCruft Supply Chain Attack Hits Gaming with Platform Windows

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DAEMON Tools Hacked: Supply Chain Attack Software Deliver
May 5, 2026
AiTM Attack: Code of Conduct Phishing Emails Target
May 5, 2026
Attackers Abuse Amazon SES for Authenticated Ph Send Phishing
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us