Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Silver Fox Exploits EV Certificates in Malware Attack

Silver Fox Exploits EV Certificates in Malware Attack

Posted on March 26, 2026 By CWS

The advanced persistent threat group, Silver Fox, also known by aliases such as Void Arachne and SwimSnake, has been actively engaging in a sophisticated malware campaign targeting Chinese-speaking individuals. This campaign leverages the AtlasCross Remote Access Trojan (RAT) to infiltrate systems and exploit stolen Extended Validation (EV) code-signing certificates.

Utilizing Typosquatted Domains

Security researcher Maurice Fielenbach from Hexastrike uncovered that Silver Fox employs typosquatted domains, mimicking well-known software brands like Surfshark, Signal, and Zoom. These fake domains are crucial to their strategy, as they use stolen EV certificates to bypass security measures and establish persistence within enterprise networks.

The malicious actors have created an elaborate infrastructure to host convincing landing pages that resemble authentic software sites. Victims downloading software from these sites receive a ZIP archive containing a cleverly disguised installer, which includes a trojanized component designed to evade detection.

Advanced Malware Techniques

The attackers have enhanced their strategy by signing their payloads with a stolen EV certificate from a Vietnamese company, “DUC FABULOUS CO.,LTD,” valid until May 2027. This outer wrapper, once executed, drops a compromised Autodesk component alongside legitimate applications to reduce suspicion among users.

The malicious loader dynamically resolves its APIs, effectively avoiding static analysis. It then extracts a hidden configuration that retrieves a second-stage payload from a command-and-control server, ensuring a fileless execution of the AtlasCross RAT.

AtlasCross RAT and PowerChell Framework

Central to this operation is the AtlasCross RAT, which utilizes a custom PowerShell execution engine called PowerChell. This framework integrates the .NET Common Language Runtime directly within the malware, allowing it to run PowerShell scripts without triggering typical security alerts.

To maintain its stealth, PowerChell disables Windows defenses and uses encryption for communication with the C2 infrastructure. The RAT also disrupts connections from Chinese security products to prevent the reception of updates, further solidifying its presence on infected systems.

Silver Fox’s evolution from process termination to network-level disruption marks their growth as a sophisticated threat actor. Security teams are advised to monitor for unusual processes and audit scheduled tasks to detect signs of PowerChell activity.

For detailed indicators of compromise, including domains and certificates used in this campaign, cybersecurity teams should remain vigilant and proactively defend against these evolving threats.

Cyber Security News Tags:APT group, AtlasCross RAT, C2 infrastructure, cyber threat, Cybersecurity, data protection, EV certificates, Malware, network security, Phishing, RAT malware, Silver Fox, typosquatting

Post navigation

Previous Post: Chinese Cyber Threats Breach Global Telecom Systems
Next Post: Vulnerability in Claude Extension Exposes Users to XSS Attacks

Related Posts

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads Cyber Security News
Critical Flaw in AVideo Platform Enables Stream Takeover Critical Flaw in AVideo Platform Enables Stream Takeover Cyber Security News
Chinese Cyber Threat Targets Qatar Amid Middle East Unrest Chinese Cyber Threat Targets Qatar Amid Middle East Unrest Cyber Security News
Net-SNMP Vulnerability Enables Buffer Overflow and the Daemon to Crash Net-SNMP Vulnerability Enables Buffer Overflow and the Daemon to Crash Cyber Security News
Hacker Extradited to US for Stealing Over .5 Million in Tax Fraud Attacks Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks Cyber Security News
Top 10 Best Supply Chain Intelligence Security Companies in 2025 Top 10 Best Supply Chain Intelligence Security Companies in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Highlights Exploited Langflow Code Injection Flaw
  • Cisco Addresses Critical IOS Security Flaws
  • Post-Quantum Cryptography and AI Vulnerabilities: A Security Update
  • Torg Grabber Stealer Evolves to Encrypted API C2
  • BIND Updates Address Critical Security Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Highlights Exploited Langflow Code Injection Flaw
  • Cisco Addresses Critical IOS Security Flaws
  • Post-Quantum Cryptography and AI Vulnerabilities: A Security Update
  • Torg Grabber Stealer Evolves to Encrypted API C2
  • BIND Updates Address Critical Security Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark