CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Mar 26, 2026

Silver Fox Abuses Stolen EV Certificates in AtlasCross RAT Malware Campaign

Cybersecurity News Archived Mar 26, 2026 ✓ Full text saved

The Chinese-nexus advanced persistent threat group Silver Fox, also tracked as Void Arachne and SwimSnake, is actively targeting Chinese-speaking users and professionals with a sophisticated AtlasCross RAT campaign. Security researcher Maurice Fielenbach of Hexastrike found that threat actors leveraging typosquatted domains impersonating trusted software brands like Surfshark, Signal, and Zoom use stolen Extended Validation (EV) […] The post Silver Fox Abuses Stolen EV Certificates in AtlasCross

Full text archived locally
✦ AI Summary · Claude Sonnet


    Home Cyber Attack News Silver Fox Abuses Stolen EV Certificates in AtlasCross RAT Malware Campaign The Chinese-nexus advanced persistent threat group Silver Fox, also tracked as Void Arachne and SwimSnake, is actively targeting Chinese-speaking users and professionals with a sophisticated AtlasCross RAT campaign. Security researcher Maurice Fielenbach of Hexastrike found that threat actors leveraging typosquatted domains impersonating trusted software brands like Surfshark, Signal, and Zoom use stolen Extended Validation (EV) code-signing certificates to bypass automated security checks and establish deep persistence within enterprise networks. The threat actors established an extensive infrastructure network to host polished landing pages mimicking legitimate application vendors. When victims attempt to download the software, they receive a ZIP archive containing a triple-nested Setup Factory installer. To masquerade as legitimate software, the attackers signed the payloads using a stolen EV certificate issued to a Vietnamese entity, “DUC FABULOUS CO.,LTD,” which remains valid until May 2027. Attack Flow (Source:Hexastrike) This outer wrapper drops a trojanized Autodesk component, dubbed Schools.exe, alongside legitimate decoy applications such as UltraViewer, to allay user suspicion. Upon execution, the trojanized loader dynamically resolves its application programming interfaces (APIs) via Process Environment Block (PEB) walking and ROR13 hashing, effectively evading static analysis. It then extracts an embedded Gh0st RAT-style configuration and retrieves a second-stage shellcode payload from its command-and-control (C2) server over raw TCP, Maurice Fielenbach added. A reflective loader subsequently maps the AtlasCross RAT into memory, executing it entirely filelessly without writing the final payload to disk. AtlasCross RAT and the PowerChell Framework At the core of this operation is the AtlasCross RAT, equipped with a custom native C/C++ PowerShell execution engine named PowerChell. This framework directly hosts the .NET Common Language Runtime (CLR) within the malware process, allowing it to execute PowerShell scripts without ever spawning powershell.exe. PowerChell systematically neuters host defenses by patching memory to disable the Antimalware Scan Interface (AMSI), disabling Event Tracing for Windows (ETW), bypassing Constrained Language Mode (CLM), and completely suppressing ScriptBlock logging. The RAT maintains communication with its C2 infrastructure using ChaCha20 encryption, leveraging per-packet random keys generated by hardware random number generators. To ensure operational longevity, AtlasCross actively terminates TCP connections established by popular Chinese security products, including 360 Total Security and Huorong. This subtle disruption methodology prevents these tools from receiving cloud-based signature updates without conspicuously killing their host processes. Additionally, the malware performs targeted DLL injection into WeChat (Wxfun.dll) for data harvesting and utilizes a bundled script leveraging tscon.exe to hijack active Remote Desktop Protocol (RDP) sessions. Indicators of Compromise (IOCs) Defense teams are advised to hunt for the following infrastructure and payload indicators observed between November 2025 and March 2026. Indicator Type Value / Details Description Stolen EV Certificate 2C1D12F8BBE0827400A8440AF74FFFA8DCC8097C DUC FABULOUS CO.,LTD (Valid through May 2027) C2 Domain & IP bifa668.com / 61.111.250[.]139 Primary raw TCP C2 communication (Port 9899) Malicious Network Beacon 53 46 75 63 6b 00 00 00 Hex value for “SFuck” sent during C2 handshake Typosquatted Domain www-surfshark[.]com Surfshark VPN lure delivery domain Typosquatted Domain signal-signal[.]com Signal encrypted messenger lure delivery domain Staging Directory C:\Program Files (x86)\GitMndsetup\ Dropped payload and decoy application folder Silver Fox’s transition from driver-based process termination to network-level security disruption showcases a rapidly maturing threat actor. Security teams should proactively monitor for non-standard processes loading System.Management.Automation.dll and audit scheduled task creation under the \Microsoft\Windows\AppID\ path to detect PowerChell execution within their environments. Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories. RELATED ARTICLESMORE FROM AUTHOR Cyber Security News GhostClaw AI Assisted Malware Attacking macOS Users to Deploy Credential-Stealing Payloads Cyber Security News LeakBase Hacker Forum Admin Arrested in Russia by Law Enforcement Authorities Cyber Attack News Hackers Plant Stealthy BPFdoor Backdoors in Telecom Networks for Long-Term Access Top 10 Essential E-Signature Solutions for Cybersecurity in 2026 January 31, 2026 Top 10 Best Data Removal Services In 2026 January 29, 2026 Best VPN Services of 2026: Fast, Secure & Affordable January 26, 2026 Top 10 Best Data Security Companies in 2026 January 23, 2026 Top 15 Best Ethical Hacking Tools – 2026 January 15, 2026
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    Mar 26, 2026
    Archived
    Mar 26, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗