Silver Fox Abuses Stolen EV Certificates in AtlasCross RAT Malware Campaign
Cybersecurity NewsArchived Mar 26, 2026✓ Full text saved
The Chinese-nexus advanced persistent threat group Silver Fox, also tracked as Void Arachne and SwimSnake, is actively targeting Chinese-speaking users and professionals with a sophisticated AtlasCross RAT campaign. Security researcher Maurice Fielenbach of Hexastrike found that threat actors leveraging typosquatted domains impersonating trusted software brands like Surfshark, Signal, and Zoom use stolen Extended Validation (EV) […] The post Silver Fox Abuses Stolen EV Certificates in AtlasCross
Full text archived locally
✦ AI Summary· Claude Sonnet
Home Cyber Attack News Silver Fox Abuses Stolen EV Certificates in AtlasCross RAT Malware Campaign
The Chinese-nexus advanced persistent threat group Silver Fox, also tracked as Void Arachne and SwimSnake, is actively targeting Chinese-speaking users and professionals with a sophisticated AtlasCross RAT campaign.
Security researcher Maurice Fielenbach of Hexastrike found that threat actors leveraging typosquatted domains impersonating trusted software brands like Surfshark, Signal, and Zoom use stolen Extended Validation (EV) code-signing certificates to bypass automated security checks and establish deep persistence within enterprise networks.
The threat actors established an extensive infrastructure network to host polished landing pages mimicking legitimate application vendors. When victims attempt to download the software, they receive a ZIP archive containing a triple-nested Setup Factory installer.
To masquerade as legitimate software, the attackers signed the payloads using a stolen EV certificate issued to a Vietnamese entity, “DUC FABULOUS CO.,LTD,” which remains valid until May 2027.
Attack Flow (Source:Hexastrike)
This outer wrapper drops a trojanized Autodesk component, dubbed Schools.exe, alongside legitimate decoy applications such as UltraViewer, to allay user suspicion.
Upon execution, the trojanized loader dynamically resolves its application programming interfaces (APIs) via Process Environment Block (PEB) walking and ROR13 hashing, effectively evading static analysis.
It then extracts an embedded Gh0st RAT-style configuration and retrieves a second-stage shellcode payload from its command-and-control (C2) server over raw TCP, Maurice Fielenbach added.
A reflective loader subsequently maps the AtlasCross RAT into memory, executing it entirely filelessly without writing the final payload to disk.
AtlasCross RAT and the PowerChell Framework
At the core of this operation is the AtlasCross RAT, equipped with a custom native C/C++ PowerShell execution engine named PowerChell. This framework directly hosts the .NET Common Language Runtime (CLR) within the malware process, allowing it to execute PowerShell scripts without ever spawning powershell.exe.
PowerChell systematically neuters host defenses by patching memory to disable the Antimalware Scan Interface (AMSI), disabling Event Tracing for Windows (ETW), bypassing Constrained Language Mode (CLM), and completely suppressing ScriptBlock logging.
The RAT maintains communication with its C2 infrastructure using ChaCha20 encryption, leveraging per-packet random keys generated by hardware random number generators.
To ensure operational longevity, AtlasCross actively terminates TCP connections established by popular Chinese security products, including 360 Total Security and Huorong.
This subtle disruption methodology prevents these tools from receiving cloud-based signature updates without conspicuously killing their host processes.
Additionally, the malware performs targeted DLL injection into WeChat (Wxfun.dll) for data harvesting and utilizes a bundled script leveraging tscon.exe to hijack active Remote Desktop Protocol (RDP) sessions.
Indicators of Compromise (IOCs)
Defense teams are advised to hunt for the following infrastructure and payload indicators observed between November 2025 and March 2026.
Indicator Type Value / Details Description
Stolen EV Certificate 2C1D12F8BBE0827400A8440AF74FFFA8DCC8097C DUC FABULOUS CO.,LTD (Valid through May 2027)
C2 Domain & IP bifa668.com / 61.111.250[.]139 Primary raw TCP C2 communication (Port 9899)
Malicious Network Beacon 53 46 75 63 6b 00 00 00 Hex value for “SFuck” sent during C2 handshake
Typosquatted Domain www-surfshark[.]com Surfshark VPN lure delivery domain
Typosquatted Domain signal-signal[.]com Signal encrypted messenger lure delivery domain
Staging Directory C:\Program Files (x86)\GitMndsetup\ Dropped payload and decoy application folder
Silver Fox’s transition from driver-based process termination to network-level security disruption showcases a rapidly maturing threat actor.
Security teams should proactively monitor for non-standard processes loading System.Management.Automation.dll and audit scheduled task creation under the \Microsoft\Windows\AppID\ path to detect PowerChell execution within their environments.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
RELATED ARTICLESMORE FROM AUTHOR
Cyber Security News
GhostClaw AI Assisted Malware Attacking macOS Users to Deploy Credential-Stealing Payloads
Cyber Security News
LeakBase Hacker Forum Admin Arrested in Russia by Law Enforcement Authorities
Cyber Attack News
Hackers Plant Stealthy BPFdoor Backdoors in Telecom Networks for Long-Term Access
Top 10
Essential E-Signature Solutions for Cybersecurity in 2026
January 31, 2026
Top 10 Best Data Removal Services In 2026
January 29, 2026
Best VPN Services of 2026: Fast, Secure & Affordable
January 26, 2026
Top 10 Best Data Security Companies in 2026
January 23, 2026
Top 15 Best Ethical Hacking Tools – 2026
January 15, 2026