Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

CISA orders removal of unsupported edge devices to reduce risk to federal networks

Combat antimicrobial resistance with McGill rapid tests

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China
Identity

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

userBy userDecember 4, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A threat actor known as Silver Fox was discovered to be orchestrating false flag operations that mimic Russian threat groups in attacks targeting Chinese organizations.

Search Engine Optimization (SEO) poisoning campaigns use Microsoft Teams lures to trick unsuspecting users into downloading malicious setup files, which lead to the deployment of ValleyRAT (Winos 4.0), a known malware associated with Chinese cybercrime groups. This activity has been implemented since November 2025.

“This campaign uses a modified ‘ValleyRAT’ loader containing Cyrillic elements to target Chinese-speaking users, including those within Western organizations operating in China. It is likely a deliberate move to mislead attribution,” ReliaQuest researcher Hayden Evans said in a report shared with The Hacker News.

ValleyRAT, a variant of Gh0st RAT, allows attackers to remotely control infected systems, extract sensitive data, execute arbitrary commands, and maintain long-term persistence within targeted networks. It is worth noting that the use of Gh0st RAT is primarily by Chinese hacker groups.

cyber security

The use of Teams for SEO poisoning campaigns marks a departure from previous efforts that leveraged other popular programs such as Google Chrome, Telegram, WPS Office, and DeepSeek to fuel infection chains.

This SEO campaign aims to redirect users to a fake website with an option to download what is purported to be Teams software. A ZIP file named “MSTчamsSetup.zip” is actually retrieved from the Alibaba Cloud URL. The archive utilizes Russian elements to disrupt attribution efforts.

Inside the file is a trojanized version of Teams called ‘Setup.exe’. It is designed to scan running processes for binaries related to 360 Total Security (‘360tray.exe’), configure Microsoft Defender Antivirus exclusions, and write and run a trojanized version of the Microsoft installer (‘Verifier.exe’) to the ‘AppData\Local\’ path.

The malware starts writing additional files such as “AppData\Local\Profiler.json”, “AppData\Roaming\Embarcadero\GPUCache2.xml”, “AppData\Roaming\Embarcadero\GPUCache.xml”, and “AppData\Roaming\Embarcadero\AutoRecoverDat.dll”.

The next step is to fly under the radar by loading data from ‘Profiler.json’ and ‘GPUcache.xml’ and launching a malicious DLL into the memory of a legitimate Windows process, ‘rundll32.exe’. The attack progresses to the final stage, where the malware establishes a connection to an external server to retrieve the final payload and facilitate remote control.

“Silver Fox’s objectives include financial gain through theft, fraud, and fraud, in addition to collecting sensitive information to gain geopolitical advantage,” Lilliaquest said. “While targets face immediate risks such as data breaches, financial loss, and system compromise, SilverFox maintains plausible deniability and is able to operate discreetly without direct government funding.”

This disclosure comes as Nextron Systems highlights another ValleyRAT attack chain that uses a trojanized Telegram installer as a starting point to begin a multi-step process that ultimately distributes the Trojan. This attack is also known for using the Bring Your Own Vulnerable Driver (BYOVD) technique to load ‘NSecKrnl64.sys’ and terminate the security solution process.

cyber security

“The installer sets dangerous Microsoft Defender exclusions, stages a password-protected archive with a renamed 7-Zip binary, and extracts the second stage executable,” said security researcher Maurice Fielenbach.

“The second-stage orchestrator, men.exe, deploys additional components to folders under the public user profile, manipulates file permissions to prevent cleanup, and sets persistence through a scheduled task that runs an encoded VBE script that launches a vulnerable driver loader and a signed binary that sideloads the ValleyRAT DLL.”

Men.exe is also responsible for enumerating running processes and identifying endpoint security-related processes. It also uses “NVIDIA.exe” to load the vulnerable “NSecKrnl64.sys” driver to run ValleyRAT. Additionally, one of the key components dropped by the Orchestrator binary is ‘bypass.exe’, which allows for privilege escalation via User Account Control (UAC) bypass.

“On the surface, the victim looks like a regular installer,” Fehrenbach said. “The malware stages files in the background, deploys drivers, tampers with defenses, and finally launches a ValleyRat beacon that maintains long-term access to the system.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleResearchers discover that volcanic eruption caused ‘butterfly effect’ and caused Black Death
Next Article Injecting anesthetic drugs may correct ‘lazy eye’, early research suggests
user
  • Website

Related Posts

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026

CISA orders removal of unsupported edge devices to reduce risk to federal networks

February 6, 2026

Asian State Assistance Group TGR-STA-1030 breaches 70 governments and infrastructure-related organizations

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

CISA orders removal of unsupported edge devices to reduce risk to federal networks

Combat antimicrobial resistance with McGill rapid tests

Asian State Assistance Group TGR-STA-1030 breaches 70 governments and infrastructure-related organizations

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.