Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/Silver Fox Phishing Now Uses Python Stealers in Tax Aud
Threats

Silver Fox Phishing Now Uses Python Stealers in Tax Aud

The China-based threat actor known as Silver Fox, also tracked as Void Arachne, has significantly updated its tactics since early 2025. Previously deploying remote access trojans, the group now...

Marcus Rodriguez
Marcus Rodriguez
March 26, 2026 3 Min Read
0 0

The China-based threat actor known as Silver Fox, also tracked as Void Arachne, has significantly updated its tactics since early 2025. Previously deploying remote access trojans, the group now distributes a custom Python-based stealer across South Asia.

Active since at least 2022, the group first gained attention through mass infection campaigns that used SEO poisoning to push ValleyRAT, a modular backdoor also known as Winos.

This latest shift reflects how Silver Fox has steadily broadened both its geographic reach and its toolkit, all while using convincing tax authority impersonation lures to gain initial entry.

The campaign unfolded in three waves between 2025 and 2026, targeting entities across Taiwan, Japan, Malaysia, India, Indonesia, Singapore, Thailand, and the Philippines.

The first wave began in January 2025, when Silver Fox sent phishing emails impersonating Taiwan’s national taxation authority. Each email carried a malicious PDF that, once opened, triggered a hidden annotation leading victims to download a ZIP archive.

That archive held two files — python311.dll and an executable — which together side-loaded ValleyRAT.

Operators deliberately timed this campaign around a real announcement by Taiwan’s Ministry of Finance regarding Year 113 tax audit selections, lending the lure a convincing appearance.

Sekoia analysts identified a second wave in mid-December 2025, when the group widened its targeting and revised its delivery method. Rather than embedding a PDF attachment, the phishing emails now contained a link to a fake tax website tailored to the victim’s country.

Downloading from that site produced an archive holding a legitimate but misconfigured Chinese Remote Monitoring and Management (RMM) tool, signed by “SyncFutureTec Company Limited.”

Silver Fox exploited a flaw in the tool’s configuration by embedding the C2 address directly into the filename, following the pattern [IPv4]ClientSetup.exe, which kept the file’s digital signature untouched and bypassed immediate security checks.

By February 2026, Silver Fox replaced the RMM tool with a compiled Python stealer, marking its third wave. The phishing website was written in Malay, indicating Malaysia as the primary target at this stage.

The stealer ran disguised as a WhatsApp backup application, using the User-Agent WhatsAppBackup/1.0 while communicating with a C2 server at xqwmwru[.]top.

On infected machines, it left behind C:WhatsAppBackupWhatsAppData.zip and a lock file in the %TEMP% directory. The C2 infrastructure was styled to resemble a legitimate WhatsApp web server.

Python Stealer Infection Chain

The Python stealer’s infection chain begins when a victim opens a phishing email and clicks an embedded link, landing on a tax-themed website that mirrors a trusted government portal.

Example of a phishing email used to target Indonesia (Source - Sekoia)
Example of a phishing email used to target Indonesia (Source – Sekoia)

The victim is then prompted to download an archive — either a ZIP or RAR file — that unpacks into a single PE32+ executable.

Phishing website impersonating Indonesia Tax entity (Source - Sekoia)
Phishing website impersonating Indonesia Tax entity (Source – Sekoia)

Running this file launches the stealer disguised as a WhatsApp backup utility, after which it begins gathering credentials, browser data, stored files, and other sensitive material from the infected device.

Collected data is compressed and sent to the C2 server through two dedicated endpoints: https://xqwmwru[.]top/upload_large.php for exfiltration and https://xqwmwru[.]top/upload_status.php to confirm transfers.

The C2 panel presents a structured backend built to manage stolen information across multiple victims at scale.

Organizations across South Asia should treat unsolicited tax-related emails with skepticism, particularly those containing attachments or links to file downloads.

Finance teams should get training on how attackers impersonate government tax agencies in phishing campaigns. Security teams should block known malicious domains and C2 addresses, including xqwmwru[.]top and the RMM tool IPv4 addresses published in the threat intelligence report.

Endpoint monitoring tools should alert on the creation of WhatsAppBackup directories and the whatsapp_backup.lock file, both of which serve as clear host-based indicators of compromise.

Inspecting outbound connections to newly registered domains with uncommon TLDs can help identify similar intrusions before data leaves the network.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitphishingSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

GhostClaw AI Malware Attacks macOS Users, Steals Assisted Attacking

Next Post

IDrive for Windows Flaw Lets Attackers Escalate Priv

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us