CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 05, 2026

Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia

Dark Reading Archived May 05, 2026 ✓ Full text saved

More than 1,600 socially engineered messages from the China-backed advanced persistent threat (APT) group target various sectors to deliver the previously undocumented ABCDoor backdoor, ValleyRAT, and other malware.

Full text archived locally
✦ AI Summary · Claude Sonnet


    ENDPOINT SECURITY THREAT INTELLIGENCE REMOTE WORKFORCE CYBERATTACKS & DATA BREACHES NEWS Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa and the Asia Pacific Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia More than 1,600 socially engineered messages from the China-backed advanced persistent threat (APT) group target various sectors to deliver the previously undocumented ABCDoor backdoor, ValleyRAT, and other malware. Elizabeth Montalbano,Contributing Writer May 4, 2026 5 Min Read AMBQUINN VIA SHUTTERSTOCK Chinese threat actor Silver Fox is behind a wave of malicious emails aimed at organizations in Russia and India, targeting them with tax-themed message lures aimed at delivering a previously undocumented backdoor malware, as well as a remote access Trojan (RAT) that's already been widely wielded as part of the group's arsenal. The campaign, which began in December, surfaced with emails impersonating Indian tax authorities, and then expanded in January to target Russian organizations using similar tactics, according to a recent report by Kaspersky researchers.  "Both waves followed a nearly identical structure: phishing emails were styled as official notices regarding tax audits, or prompted users to download an archive containing a 'list of tax violations,'" Kaspersky researchers wrote in the report.  Inside the archive was a modified Rust-based loader pulled from a public repository, which would download and execute the well-known ValleyRAT backdoor. In some cases, the PDFs embedded links to attacker-controlled infrastructure hosting malicious ZIP or RAR files, the researchers said. The campaign also delivered a backdoor that the researchers hadn't seen before, dubbed "ABCDoor." Related:China's 'PlushDaemon' Hackers Infect Routers to Hijack Software Updates Kaspersky recorded more than 1,600 malicious messages within its telemetry related to the campaigns between early January and early February targeting various sectors — including industrial, consulting, retail, and transportation. Tax Scams Show Universal Reach Such tax scams are common in the US but apparently also have universal appeal for attackers looking to scam victims in other countries. That's likely because they target "a very human weakness," notes Rickard Carlsson, CEO of application security firm Detectify. "People behave differently when they think a government authority is involved,"  he tells Dark Reading. "An email about taxes, penalties, or an audit creates urgency before the victim has even opened the attachment." Indeed, social engineering in general remains an effective scam tactic, "because attackers only need one person to click once," he adds, while defenders "are expected to get everything right all the time, often across an attack surface that keeps changing as new tools, services, integrations, and cloud assets are added."  He adds, "On top of that, it is often impossible to fully lock systems down, as doing so would render them unusable for the business." ABCDoor: A Stealthy New Backdoor Malware As mentioned, successful attacks resulted in the delivery of various payloads, notably a previously undocumented Python backdoor called ABCDoor that Kaspersky discovered has been in use by Silver Fox since at least late 2024. Overall, it has been used "in real-world attacks from the first quarter of 2025 to the present day," the researchers wrote, even though it was just recently uncovered. Related:WhatsApp Leaks User Metadata to Attackers ABCDoor establishes persistence through Windows Registry Run keys and scheduled tasks, then communicates with its command-and-control (C2) servers over HTTPS using asynchronous Socket.IO messaging. Running under a legitimate pythonw.exe process to evade detection, the malware focuses less on traditional command execution and more on covert remote interaction capabilities, including multimonitor screen streaming via FFmpeg, remote mouse and keyboard control, clipboard theft, file operations, and limited file-encryption features.  The backdoor malware also supports self-updating and self-removal, collects extensive host metadata, and leaves forensic artifacts in the registry and %LOCALAPPDATA% directories that defenders can monitor for detection. Other payloads in the attacks include ValleyRAT, the use of which by Silver Fox already has been documented, and a customized version of the RustSL loader that's been heavily modified by the group to suit its own purposes, according to Kaspersky. Related:Two-Factor Authentication Breaks Free From the Desktop Expanding Geographic Reach for Cyberattacks Silver Fox is a China-backed threat group that's been active for a few years and has become a sort of Swiss Army knife of threat groups, with both diverse tactics, techniques, and procedures (TTPs) as well as motives for its attacks. While primarily aimed at cyberespionage and critical-infrastructure disruption, the group also at times conducts financially motivated attacks, a cross pollination that's been seen in North Korean threat actors but is rare for Chinese threat groups. While primarily focused on targeting organizations in Taiwan, North America and Japan also are home to some of Silver Fox's victims. The recent campaign is significant in that it shows the group expanding its regional focus for the first time to targets in Russia, the researchers noted.  Silver Fox also has added configurations for Japan for its specific implementation of RustSL loader, which itself is configured to operate in specific countries, the researchers noted. "Theoretically, the group could add other countries to this list in the future," they added. Email Vigilance Remains a Priority Though it may seem like a no-brainer, the campaign once again demonstrates how emails remain a weak link in organizations, even though — or perhaps because — employees have been training on email security issues for so long. Security teams must avoid complacence when it comes to email security across the corporate network. "This serves as another reminder of the critical need for vigilance and the thorough verification of all emails, even those purportedly from authoritative sources," the researchers wrote. "We recommend that organizations improve employee security awareness through regular training and educational courses." Indeed, the phishing email is "the front door" through which attackers can install backdoors to gain persistence and remote access, and earn time to explore the environment for future compromise, Detectify's Carlsson tells Dark Reading. "Small visibility gaps can become serious if an organization does not have a clear picture of which systems, exposed assets, and access paths exist," he says. For defenders, the lesson isn't just about training employees not to click, however, Carlsson warns. "Organizations have to adopt an 'assume breach' posture, operating under the reality that devices will eventually be compromised and plan accordingly," he says. The planning should include: email filtering, attachment and URL analysis, endpoint detection, least-privilege access, software execution controls, and continuous visibility into their external attack surface. Don't miss the latest Dark Reading Confidential podcast, NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later, for a candid conversation with Chris Inglis, head civilian in charge of the NSA during the Edward Snowden affair. Inglis reflects what the NSA should have done better, what he wants CISOs to know about protecting against their own insider threats, and what his reaction would be if Snowden received a pardon. Listen now! Read more about: DR Global Asia Pacific About the Author Elizabeth Montalbano Contributing Writer Elizabeth Montalbano is a freelance writer, journalist, and therapeutic writing mentor with more than 25 years of professional experience. Her areas of expertise include technology, business, and culture. Elizabeth previously lived and worked as a full-time journalist in Phoenix, San Francisco, and New York City; she currently resides in a village on the southwest coast of Portugal. In her free time, she enjoys surfing, hiking with her dogs, traveling, playing music, yoga, and cooking. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports How Enterprises Are Developing Secure Applications How Enterprises Are Harnessing Emerging Technologies in Cybersecurity Ditch the Data Center: Understanding Flexible Cloud Infrastructure Security Management 2025 State of Malware Sysdig 2025 Cloud-Native Security and Usage Report Access More Research Webinars How Well Can You See What's in Your Cloud? Implementing CTEM: Beyond Vulnerability Management Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning Tips for Managing Cloud Security in a Hybrid Environment? Zero Trust Architecture for Cloud environments: Implementation Roadmap More Webinars You May Also Like ENDPOINT SECURITY 2 Separate Campaigns Probe Corporate LLMs for Secrets by Elizabeth Montalbano, Contributing Writer JAN 12, 2026 ENDPOINT SECURITY Pro-Russian Hackers Use Linux VMs to Hide in Windows by Alexander Culafi NOV 04, 2025 ENDPOINT SECURITY We've All Been Wrong: Phishing Training Doesn't Work by Nate Nelson, Contributing Writer JUL 01, 2025 ENDPOINT SECURITY Attackers Lace Fake GenAI Tools With Malware by Alexander Culafi, Senior News Writer, Dark Reading MAY 12, 2025 Editor's Choice CYBER RISK NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later byDark Reading Editorial Team APR 28, 2026 IDENTITY & ACCESS MANAGEMENT SECURITY Oracle Red Bull Racing Team Revs Up Automation to Boost Security byArielle Waldman APR 30, 2026 5 MIN READ CYBER RISK Claude Mythos Fears Startle Japan's Financial Services Sector byNate Nelson APR 30, 2026 5 MIN READ Want more Dark Reading stories in your Google search results? Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars How Well Can You See What's in Your Cloud? THURS, JUNE 4, 2026 AT 1:00PM EST Implementing CTEM: Beyond Vulnerability Management THURS, MAY 21, 2026 AT 1PM EST Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning MON, MAY 11, 2026 AT 1:00PM ET Tips for Managing Cloud Security in a Hybrid Environment? THURS, MAY 7, 2026 AT 1PM EST Zero Trust Architecture for Cloud environments: Implementation Roadmap TUES, MAY 12, 2026 AT 1PM EST More Webinars BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    May 05, 2026
    Archived
    May 05, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗