Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

An important part of enterprise AI governance

Ukrainian Network FDN3 launches massive brute force attacks on SSL VPN and RDP devices

£104 million boosts local transport to transform UK communities

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Silver Fox Exploit Microsoft Signature Watchdog Driver Deploys ValleyRat Malware
Identity

Silver Fox Exploit Microsoft Signature Watchdog Driver Deploys ValleyRat Malware

userBy userSeptember 2, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A threat actor known as Silver Fox is attributed to the abuse of previously unknown vulnerable drivers associated with Watchdog Anti-Malware as part of your own Vulnerable Driver (BYOVD) attacks aimed at disarming security solutions installed on compromised hosts.

The vulnerable driver in question is “AMSDK.SYS” (version 1.0.600), a valid, 64-bit signed Windows kernel device driver rated as being built on the Zemana Anti-Malware SDK.

“The driver based on the Zemana Anti-Malware SDK is signed by Microsoft, not listed on Microsoft’s vulnerable driver block list, and was not detected in community projects like Loldrivers,” Check Point said in the analysis.

This attack is characterized by a dual driver strategy in which a known vulnerable Zemana driver (“Zam.exe”) is used on Windows 7 machines and an undetected watchdog driver for systems running on Windows 10 or 11.

Watchdog anti-malware drivers are known to contain multiple vulnerabilities. First, it is the ability to terminate any process without checking whether the process is protected (PP/PPL). It is also susceptible to local privilege escalations, allowing attackers to gain unlimited access to the driver’s devices.

Audit and subsequent

The ultimate goal of the campaign, first discovered at Checkpoint in late May 2025, is to leverage these vulnerable drivers to neutralize endpoint protection products and create a clear path to malware deployment and persistence without causing signature-based defenses.

As previously observed, the campaign is designed to provide ValleyRat (aka Winos 4.0) as the final payload, providing remote access and control capabilities for threat actors. The cybersecurity company said the attack employs anti-analytics capabilities, two embedded drivers, anti-virus killer logic, and ValleyRat DLL downloader in one binary.

“When running, the sample performs several common anti-analytic checks, including anti-VM (detecting virtual environments), anti-sandbox (detecting runs within sandboxes), and hypervisor detection,” says Checkpoint. “If any of these checks fail, execution will be aborted and a fake system error message will be displayed.”

The downloader is designed to communicate with a Command and Control (C2) server to retrieve modular Valley Rat backdoors to infected machines.

Following the responsible disclosure, Watchdog has released a patch (version 1.1.100) to address LPE risks by implementing a strong discretionary access control list (DACL) while not plugging in any process termination issues. This had the side effect of changing a single byte without disabling Microsoft’s signature, which allowed the attacker to adapt quickly, quickly adapt and incorporate the modified version.

“By flipping a single byte in an uncertified timestamp field, it saves the driver’s valid Microsoft signatures and effectively bypasses hash-based block lists while generating a new file hash,” Check Point said. “This subtle and efficient evasion technique reflects the patterns seen in previous campaigns.”

“This campaign shows how threat actors work to weaponize unknown, signed drivers beyond known weaknesses. This is a blind spot for many defense mechanisms. Microsoft signed, previously unclassified, exploitation of vulnerable drivers, and evasive techniques such as signature manipulation represent sophisticated and evolving threats.”

Silver Fox, also known as Swimsnake, the great thief of Valley (or Valley Thief), UTG-Q-1000 and Void Arachne, has been rated very active since early last year, targeting Chinese-speaking victims using fake websites to supply Troijek to supply tools for remote access, primarily using Google Chrome, Telegram and Artificial Intelligence (AI).

According to Chinese cybersecurity vendor Antiy, the hacking group is believed to have been around since late 2022, and has targeted domestic users and businesses in attempts to steal secrets and fraud.

“Cybercrime groups spread malicious files primarily through instant messaging software (such as WeChat, Enterprise Wechat), search engine SEO promotions, phishing emails and more,” the company said. “The ‘swimsuit’ cybercrime group is frequently updating its malware and avoidance methods. ”

The attacks serve valet rats that include online modules that can capture screenshots of WeChat and online banks using Trojanized open source software, malicious programs built using QT frameworks, or MSI installers disguised as Youdao, Sogou AI, WPS Office, and Deepseek.

CIS Build Kit

The development aims to detail another campaign that Qianxin has been mounted by a “finance group” within Silver Fox, targeting financial people and managers of businesses and institutions to loot and directly profit from sensitive financial information through fraud.

These attacks leverage tax audits, e-invoices, grant announcements, and human resources-related fishing ladies to deceive users, run remote access trojans, and rely on legitimate cloud services such as Alibaba Cloud OSS and Youdao Cloud Notes to host malicious payloads to attempt detection.

The Finance Group is one of four subclusters of Silver Fox, with the other three being the News and Romance Group, Design and Manufacturing Group, and Black Water Ring Hall Group.

Interestingly, after the financial group gains control of the victim’s computer through methods such as hole attacks and phishing, they take over the victim’s social media accounts and use them to send phishing QR codes to various WeChat group chats with the aim of harvesting bank account numbers and passwords from group members, ultimately draining funds from the bank account for profit.

“The UTG-Q-1000 is one of China’s most active and offensive cybercrime groups in recent years. Their businesses are highly organized, technologically refined and economically motivated,” Qianxin says. “They have established a complete black market profit chain that includes spying (data theft), remote control with malware, financial fraud and phishing.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe study reveals major global inequality in cancer research funding
Next Article Research reveals the effects of electrical discharge on satellites
user
  • Website

Related Posts

An important part of enterprise AI governance

September 2, 2025

Ukrainian Network FDN3 launches massive brute force attacks on SSL VPN and RDP devices

September 2, 2025

Malicious NPM Package nodejs-smtp mimic nodemailer, target atomic and exodus wallet

September 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

An important part of enterprise AI governance

Ukrainian Network FDN3 launches massive brute force attacks on SSL VPN and RDP devices

£104 million boosts local transport to transform UK communities

Research reveals the effects of electrical discharge on satellites

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Compliance: The New Era of Smart Medical Device Software Integration

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.