Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Silver Fox uses AtlasCross RAT and fake domains to scale Asian cyber campaign

The AI ​​arms race – why integrated exposure management is becoming a board priority

UK to build first floating offshore wind farm in Celtic Sea

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Silver Fox uses AtlasCross RAT and fake domains to scale Asian cyber campaign
Identity

Silver Fox uses AtlasCross RAT and fake domains to scale Asian cyber campaign

By March 31, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Chinese-speaking users are the target of an active campaign that uses typosquatted domains to impersonate trusted software brands to distribute a previously undocumented remote access Trojan named AtlasCross RAT.

“The operation targeted VPN clients, encrypted messengers, video conferencing tools, cryptocurrency trackers, and e-commerce applications, with 11 identified distribution domains impersonating brands including Surfshark VPN, Signal, Telegram, Zoom, Microsoft Teams, and more,” Germany-based cybersecurity firm Hexastrike said in a report released last week.

This activity has been attributed to a Chinese cybercrime group called Silver Fox, which has also been tracked as SwimSnake, The Great Thief of Valley (or Valley Thief), UTG-Q-1000, and Void Arachne.

The discovery of AtlasCross RAT represents an evolution in the threat actor’s arsenal from Gh0st RAT derivatives such as ValleyRAT (aka Winos 4.0), Gh0stCringe, and HoldingHands RAT (aka Gh0stBins).

This attack chain involves using a fake website as bait to trick users into downloading a ZIP archive containing an installer that drops a trojanized Autodesk binary along with a legitimate decoy application.

The trojanized AutoDesk installer then launches a shellcode loader that decrypts the embedded Gh0st RAT configuration and extracts command and control (C2) details, and downloads a second stage shellcode payload from ‘bifa668′.[.]com’ over TCP to port 9899, ​​which ultimately runs the AtlasCross RAT in memory.

Most of the fake websites were registered on a single day, October 27, 2025, indicating a deliberate approach behind this campaign. A list of confirmed malware distribution domains is below.

app-zoom.com (Zoom) eyy-eyy.com (unknown) kefubao-pc.com (KeFuBao, e-commerce) Quickq-quickq.com (QuickQ VPN) signal-signal.com (signal) telegrtam.com.cn (telegram) trezor-trezor.com (Trezor crypto wallet) Ultraviewer-cn.com (UltraViewer) wwtalk-app.com (WangWang) www-surfshark.com (Surfshark VPN) www-teams.com (Microsoft Teams)

All identified installer packages were found to contain the same stolen Extended Verification Code Signing Certificate issued to DUC FABULOUS CO.,LTD, a Vietnamese legal entity registered in Hanoi. The fact that the same certificate has been used in other unrelated malware campaigns increases the likelihood that it will be widely reused within the cybercriminal ecosystem to give malicious payloads an appearance of legitimacy and bypass security checks.

“The RAT incorporates the PowerChell framework, a native C/C++ PowerShell execution engine that hosts the .NET CLR directly within the malware process, disabling AMSI, ETW, constrained language mode, and ScriptBlock logging before executing commands,” Hexastrike said. “C2 traffic is encrypted with ChaCha20 using a per-packet random key generated by hardware RNG.”

AtlasCross RAT comes with features that facilitate target DLL injection into WeChat, RDP session hijacking, active TCP level termination of connections from Chinese security products (e.g. 360 Safe, Huorong, Kingsoft, QQ PC Manager), file and shell manipulation, and creation of persistent scheduled tasks instead of using Bring Your Own Vulnerable Driver (BYOVD) techniques.

“AtlasAgent/AtlasCross RAT represents the current evolution of the group’s tools, built on the Gh0st RAT protocol foundation, consistent with the ValleyRAT and Winos 4.0 lineages,” the company added. “The addition of the PowerChell framework and a comprehensive security bypass chain is a significant upgrade in functionality.”

In a report published earlier this month, Chinese security vendor Knownsec 404 characterized Silver Fox as one of the “most active cyber threats” in recent years, targeting organizational managers and financial personnel through WeChat, QQ, phishing emails, and fake tool sites, infecting them with malware and enabling remote control, data theft, and financial fraud.

“Silver Fox’s domain strategy relies on a high degree of imitation of official domains, combined with regional labels to reduce user suspicion,” the company said. “Operators use multifaceted approaches such as typosquatting, domain hijacking, and DNS manipulation to feign legitimacy.”

Recent attack campaigns have also been observed to shift from ValleyRAT delivered via malicious PDF attachments in phishing emails targeting organizations in Taiwan, to exploiting a genuine but misconfigured Chinese remote monitoring and management (RMM) tool called SyncFuture TSM, and then to deploying a Python-based stealer disguised as a WhatsApp application.

These attacks targeted companies in Japan, Malaysia, the Philippines, Thailand, Indonesia, Singapore, and India since at least December 2025. Some aspects of this campaign were previously covered by eSentire in January 2026, an attack that used tax-themed decoys to target users in India with Blackmoon malware.

Silver Fox’s use of ValleyRAT in conjunction with RMM tools and custom stealers highlights a flexible arsenal that allows attackers to quickly adapt infection chains and conduct sophisticated strategic operations alongside profit-driven campaigns in South Asia, while maintaining long-term access to compromised systems.

“The group maintains a dual-track model, continually evolving its tools to conduct widespread and opportunistic campaigns alongside more sophisticated operations,” French cybersecurity firm Sequoia said in a statement. “The second and third campaigns, utilizing RMM tools and Python stealers, appear to be more closely aligned with opportunistic cybercriminals than APT operations.”

As of last week, the hacker group is also believed to be involved in an active spear-phishing campaign to identify Japanese manufacturers and other companies and infect them with ValleyRAT, using persuasive phishing lures related to tax compliance violations, pay adjustments, job changes, and employee stock ownership plans.

“ValleyRAT enables attackers to remotely control compromised machines, collect sensitive information, monitor user activity, and maintain persistence in targeted environments,” ESET said. “This allows attackers to penetrate deeper into the network, steal sensitive data, or prepare additional stages of an attack.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe AI ​​arms race – why integrated exposure management is becoming a board priority

Related Posts

The AI ​​arms race – why integrated exposure management is becoming a board priority

March 31, 2026

Axios supply chain attack pushes cross-platform RAT via compromised npm account

March 31, 2026

OpenAI fixes ChatGPT data extraction flaw and Codex GitHub token vulnerability

March 30, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Silver Fox uses AtlasCross RAT and fake domains to scale Asian cyber campaign

The AI ​​arms race – why integrated exposure management is becoming a board priority

UK to build first floating offshore wind farm in Celtic Sea

Los Alamos neutron detector improves accuracy in extreme radiation

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.