Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Silver Fox APT Hackers Leveraging Vulnerable Driver to Attack Windows 10 and 11 Systems by Evading EDR/AV

Posted on August 29, 2025August 29, 2025 By CWS

Rising in mid-2025, a classy marketing campaign attributed to the Silver Fox APT has begun exploiting a beforehand unreported weak driver to compromise fashionable Home windows environments.

This marketing campaign leverages the WatchDog Antimalware driver (amsdk.sys, model 1.0.600), a Microsoft-signed part constructed on the Zemana Anti-Malware SDK.

Weak valid-signed WatchDog Antimalware Driver (Supply – Test Level)

By abusing its arbitrary course of termination functionality, menace actors bypass endpoint detection and response (EDR) and antivirus (AV) protections on totally patched Home windows 10 and 11 methods with out triggering signature-based defenses.

Preliminary phases of the assault contain deploying a self-contained loader that embeds a number of drivers and anti-analysis layers.

Contaminated machines obtain a loader binary that first performs checks towards digital machines, sandboxes, and identified evaluation environments.

As soon as these checks move, the loader drops two drivers—one legacy Zemana-based driver for compatibility with older methods, and the newer WatchDog Antimalware driver for contemporary targets—right into a newly created C:Program FilesRunTime listing.

Test Level researchers famous that each drivers are then registered as kernel companies: the legacy driver underneath ZAM.exe for Home windows 7, and amsdk.sys for Home windows 10/11.

The loader’s “Termaintor” service ensures persistence for the executed loader stub, whereas Amsdk_Service facilitates driver loading.

Following driver registration, the marketing campaign’s customized EDR/AV killer logic opens a deal with to the weak driver’s machine namespace (.amsdk) and points IOCTL calls to register the malicious course of and terminate protected safety service processes.

The termination routine reads from a Base64-encoded course of listing of over 190 entries—spanning fashionable antivirus and endpoint safety companies—and sends IOCTL_TERMINATE_PROCESS instructions by way of DeviceIoControl to eradicate working defenses.

Course of termination (Supply – Test Level)

By abusing the driving force’s lack of a FILE_DEVICE_SECURE_OPEN flag and lacking PP/PPL checks, Silver Fox achieves dependable AV evasion.

Test Level analysts recognized that after terminating safety processes, the loader decodes and injects a UPX-packed ValleyRAT downloader module into reminiscence.

This module connects to Chinese language-hosted C2 servers, decrypts configuration visitors utilizing a easy XOR cipher, and fetches the ultimate ValleyRAT backdoor payload.

ValleyRAT (“Winos”) gives full distant entry capabilities together with command execution and information exfiltration, confirming the marketing campaign’s attribution to Silver Fox.

Detection Evasion via Signed-Driver Manipulation

Though WatchDog launched a patched driver (wamsdk.sys, model 1.1.100) following disclosure, Silver Fox shortly tailored by flipping a single byte inside the unauthenticated attributes of the driving force’s signature timestamp.

This delicate modification preserved the Microsoft Authenticode signature whereas producing a brand new file hash, successfully bypassing hash-based blocklists with out altering signature validity.

The altered driver is then seamlessly loaded heading in the right direction methods, persevering with the exploitation cycle.

This system underscores a broader pattern: adversaries weaponizing authentic, signed drivers and manipulating timestamp countersigns to evade each static and behavior-based detection mechanisms.

Increase your SOC and assist your staff shield what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:APT, Attack, Driver, EDRAV, Evading, Fox, Hackers, Leveraging, Silver, Systems, Vulnerable, Windows

Post navigation

Previous Post: Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations
Next Post: PhpSpreadsheet Library Vulnerability Enables Attackers to Feed Malicious HTML Input

Related Posts

Electronic Arts Blocked 300,000 Attempts Following Battlefield 6 Beta Launch Cyber Security News
Hackers Abuse EV Certificates to Sign Completely Undetectable DMG Malware Cyber Security News
Timeliner – Windows Forensic Tool for DFIR Investigators Cyber Security News
Four Hackers Arrested by UK Police for Attacks on M&S, Co-op and Harrods Stores Cyber Security News
Microsoft Eliminated High-Privilege Access to Enhance Microsoft 365 Security Cyber Security News
Hackers Accessed Email Account Contains Valid Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability
  • npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
  • Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access
  • Hackers Attacking macOS Users With Spoofed Homebrew Websites to Inject Malicious Payloads
  • Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability
  • npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
  • Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access
  • Hackers Attacking macOS Users With Spoofed Homebrew Websites to Inject Malicious Payloads
  • Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News