Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/CyberSecurity News/Silver Fox Uses Stolen EV Certs in AtlasCross Abuses Certificates
CyberSecurity News

Silver Fox Uses Stolen EV Certs in AtlasCross Abuses Certificates

A sophisticated AtlasCross RAT campaign is currently underway, orchestrated by the Chinese-nexus advanced persistent threat (APT) group Silver Fox. This threat actor, also known as Void Arachne and...

Jennifer sherman
Jennifer sherman
March 26, 2026 3 Min Read
0 0

A sophisticated AtlasCross RAT campaign is currently underway, orchestrated by the Chinese-nexus advanced persistent threat (APT) group Silver Fox. This threat actor, also known as Void Arachne and SwimSnake, is specifically targeting Chinese-speaking users and professionals.

Security researcher Maurice Fielenbach of Hexastrike found that threat actors leveraging typosquatted domains impersonating trusted software brands like Surfshark, Signal, and Zoom use stolen Extended Validation (EV) code-signing certificates to bypass automated security checks and establish deep persistence within enterprise networks.

The threat actors established an extensive infrastructure network to host polished landing pages mimicking legitimate application vendors. When victims attempt to download the software, they receive a ZIP archive containing a triple-nested Setup Factory installer.

To masquerade as legitimate software, the attackers signed the payloads using a stolen EV certificate issued to a Vietnamese entity, “DUC FABULOUS CO.,LTD,” which remains valid until May 2027.

Attack Flow (Source:Hexastrike)

This outer wrapper drops a trojanized Autodesk component, dubbed Schools.exe, alongside legitimate decoy applications such as UltraViewer, to allay user suspicion.

Upon execution, the trojanized loader dynamically resolves its application programming interfaces (APIs) via Process Environment Block (PEB) walking and ROR13 hashing, effectively evading static analysis.

It then extracts an embedded Gh0st RAT-style configuration and retrieves a second-stage shellcode payload from its command-and-control (C2) server over raw TCP, Maurice Fielenbach added.

A reflective loader subsequently maps the AtlasCross RAT into memory, executing it entirely filelessly without writing the final payload to disk.

AtlasCross RAT and the PowerChell Framework

At the core of this operation is the AtlasCross RAT, equipped with a custom native C/C++ PowerShell execution engine named PowerChell. This framework directly hosts the .NET Common Language Runtime (CLR) within the malware process, allowing it to execute PowerShell scripts without ever spawning powershell.exe.

PowerChell systematically neuters host defenses by patching memory to disable the Antimalware Scan Interface (AMSI), disabling Event Tracing for Windows (ETW), bypassing Constrained Language Mode (CLM), and completely suppressing ScriptBlock logging.

The RAT maintains communication with its C2 infrastructure using ChaCha20 encryption, leveraging per-packet random keys generated by hardware random number generators.

To ensure operational longevity, AtlasCross actively terminates TCP connections established by popular Chinese security products, including 360 Total Security and Huorong.

This subtle disruption methodology prevents these tools from receiving cloud-based signature updates without conspicuously killing their host processes.

Additionally, the malware performs targeted DLL injection into WeChat (Wxfun.dll) for data harvesting and utilizes a bundled script leveraging tscon.exe to hijack active Remote Desktop Protocol (RDP) sessions.

Indicators of Compromise (IOCs)

Defense teams are advised to hunt for the following infrastructure and payload indicators observed between November 2025 and March 2026.

Indicator Type Value / Details Description
Stolen EV Certificate 2C1D12F8BBE0827400A8440AF74FFFA8DCC8097C DUC FABULOUS CO.,LTD (Valid through May 2027)
C2 Domain & IP bifa668.com / 61.111.250[.]139 Primary raw TCP C2 communication (Port 9899)
Malicious Network Beacon 53 46 75 63 6b 00 00 00 Hex value for “SFuck” sent during C2 handshake
Typosquatted Domain www-surfshark[.]com Surfshark VPN lure delivery domain
Typosquatted Domain signal-signal[.]com Signal encrypted messenger lure delivery domain
Staging Directory C:Program Files (x86)GitMndsetup Dropped payload and decoy application folder

Silver Fox’s transition from driver-based process termination to network-level security disruption showcases a rapidly maturing threat actor.

Security teams should proactively monitor for non-standard processes loading System.Management.Automation.dll and audit scheduled task creation under the MicrosoftWindowsAppID path to detect PowerChell execution within their environments.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarePatchSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Synology DSM Flaw Allows Remote Command Execution DiskStation Manager

Next Post

Fake Screenshots Infect Web3 Support Staff with Multi-Stage Malware

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us