Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
嗯,用户让我用中文帮他总结一下这篇文章,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写文章描述即可。 首先,我需要通读整篇文章,理解其主要内容。看起来这篇文章是关于一个网络犯罪集团Silver Fox(也被称为SwimSnake等)利用仿冒知名软件品牌的域名传播一种名为AtlasCross RAT的远程访问木马。他们攻击的目标主要是中文用户,涉及VPN、加密通讯、视频会议工具等多个领域。 接下来,我需要提取关键信息:攻击者是谁,他们使用了什么方法,目标是什么,以及他们的攻击手段有哪些特点。比如,他们注册了很多仿冒域名,使用了被盗的数字证书来提升恶意软件的可信度,并且他们的木马具备多种功能,如DLL注入、RDP会话劫持等。 然后,我要把这些信息浓缩到100字以内。要注意用词简洁明了,涵盖主要攻击者、目标、方法和影响。 可能的结构是:首先点明攻击者和目标,然后说明他们如何进行攻击(仿冒域名、恶意软件),接着提到他们的技术手段(如使用PowerChell框架、加密通信),最后说明影响或特点。 检查一下是否有遗漏的重要信息:比如攻击涉及的地区、时间等。但因为字数限制,可能需要舍弃一些细节。 最后整合成一句话:例如,“中文用户为目标的网络犯罪活动利用仿冒知名软件品牌的域名传播远程访问木马AtlasCross RAT。该活动由名为Silver Fox的中国网络犯罪团伙实施,涉及VPN客户端、加密通讯工具等多个领域,并使用PowerChell框架和ChaCha20加密技术进行攻击。” 这样应该符合用户的要求。 </think> 中文用户为目标的网络犯罪活动利用仿冒知名软件品牌的域名传播远程访问木马AtlasCross RAT。该活动由名为Silver Fox的中国网络犯罪团伙实施,涉及VPN客户端、加密通讯工具等多个领域,并使用PowerChell框架和ChaCha20加密技术进行攻击。 2026-3-31 11:46:0 Author: thehackernews.com(查看原文) 阅读量:4 收藏

Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a previously undocumented remote access trojan named AtlasCross RAT.

"The operation covers VPN clients, encrypted messengers, video conferencing tools, cryptocurrency trackers, and e-commerce applications, with eleven confirmed delivery domains impersonating brands including Surfshark VPN, Signal, Telegram, Zoom, Microsoft Teams, and others," Germany-based cybersecurity company Hexastrike said in a report published last week.

The activity has been attributed to a Chinese cybercrime group called Silver Fox, which is also tracked as SwimSnake, The Great Thief of Valley (or Valley Thief), UTG-Q-1000, and Void Arachne.

The discovery of AtlasCross RAT represents an evolution of the threat actor's arsenal from Gh0st RAT derivatives like ValleyRAT (aka Winos 4.0), Gh0stCringe, and HoldingHands RAT (aka Gh0stBins).

The attack chains involve using bogus websites as lures to trick users into downloading ZIP archives containing an installer that drops a trojanized Autodesk binary along with the legitimate decoy application.

The trojanized AutoDesk installer, in turn, launches a shellcode loader that decrypts an embedded Gh0st RAT configuration to extract the command-and-control (C2) details and then downloads a second-stage shellcode payload from "bifa668[.]com" over TCP on port 9899, ultimately leading to the execution of AtlasCross RAT in memory.

The majority of fake websites were registered in a single day on October 27, 2025, indicating a deliberate approach behind the campaign. The list of confirmed malware delivery domains is listed below -

  • app-zoom.com (Zoom)
  • eyy-eyy.com (unknown)
  • kefubao-pc.com (KeFuBao, a Chinese customer service software for e-commerce)
  • quickq-quickq.com (QuickQ VPN)
  • signal-signal.com (Signal)
  • telegrtam.com.cn (Telegram)
  • trezor-trezor.com (Trezor)
  • ultraviewer-cn.com (UltraViewer)
  • wwtalk-app.com (WangWang)
  • www-surfshark.com (Surfshark VPN)
  • www-teams.com (Microsoft Teams)

All identified installer packages have been found to carry the same stolen Extended Validation code-signing certificate issued to DUC FABULOUS CO.,LTD, a Vietnamese entity registered in Hanoi. The fact that the same certificate has been used in other unrelated malware campaigns has raised the possibility of widespread reuse within the cybercriminal ecosystem to lend malicious payloads a veneer of legitimacy and bypass security checks.

"The RAT embeds the PowerChell framework, a native C/C++ PowerShell execution engine that hosts the .NET CLR directly within the malware process and disables AMSI, ETW, Constrained Language Mode, and ScriptBlock logging before executing any commands," Hexastrike said. "C2 traffic is encrypted with ChaCha20 using per-packet random keys generated via hardware RNG."

AtlasCross RAT comes with capabilities to facilitate targeted DLL injection into WeChat, RDP session hijacking, active TCP-level termination of connections from Chinese security products (e.g., 360 Safe, Huorong, Kingsoft, and QQ PC Manager) instead of using the Bring Your Own Vulnerable Driver (BYOVD) technique, file and shell operations, and persistent scheduled task creation.

"The AtlasAgent/AtlasCross RAT represents the current evolution of the group’s tooling, building on Gh0st RAT protocol foundations consistent with the ValleyRAT and Winos 4.0 lineage," the company added. "The addition of the PowerChell framework and a comprehensive security bypass chain marks a significant capability upgrade."

In a report published earlier this month, Chinese security vendor Knownsec 404 characterized Silver Fox as one of the "most active cyber threats" in recent years, targeting managerial and finance staff in organizations via WeChat, QQ, phishing emails, and fake tool sites to infect them with malware to enable remote control, data theft, and financial fraud.

"Silver Fox's domain strategy hinges on highly mimicking official domains combined with regional labeling to suppress user suspicion," the company said. "Operators use a multi-pronged approach – typo-squatting, domain hijacking, and DNS manipulation – to create a façade of legitimacy."

Recent attack campaigns have also been observed transitioning from ValleyRAT delivered via malicious PDF attachments in phishing emails targeting Taiwanese organizations to abusing a legitimate but misconfigured Chinese remote monitoring and management (RMM) tool called SyncFuture TSM, and later to deploying a Python-based stealer disguised as a WhatsApp application.

These attacks have targeted entities in Japan, Malaysia, the Philippines, Thailand, Indonesia, Singapore, and India since at least December 2025. Some aspects of the campaign were previously highlighted by eSentire in January 2026, with the attacks using tax-themed lures to target Indian users with the Blackmoon malware.

Silver Fox's use of ValleyRAT alongside RMM tools and custom stealer highlights a flexible arsenal that allows the adversary to rapidly adapt its infection chains and conduct advanced, strategic operations in tandem with profit-driven campaigns in South Asia, while maintaining long-term access to compromised systems.

"The group maintains a dual-track model, running broad, opportunistic campaigns alongside its more sophisticated operations by continuously evolving its tooling," French cybersecurity company Sekoia said. "The second and third campaigns leaning on the RMM tool and Python stealer appear to align more closely with opportunistic cybercrime than APT operations."

As of last week, the hacking crew has also been attributed to an active spear-phishing campaign that uses persuasive phishing lures related to tax compliance violations, salary adjustments, job position changes, and employee stock ownership plans to single out Japanese manufacturers and other businesses and infect them with ValleyRAT.

"Once deployed, ValleyRAT enables the actor to take remote control of the compromised machine, harvest sensitive information, monitor user activity, and maintain persistence in the targeted environment," ESET said. "This can allow the attacker to burrow deeper into the network, steal confidential data, or prepare additional stages of an attack."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/silver-fox-expands-asia-cyber-campaign.html
如有侵权请联系:admin#unsafe.sh