Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware

Posted on September 2, 2025September 2, 2025 By CWS

The menace actor often known as Silver Fox has been attributed to abuse of a beforehand unknown susceptible driver related to WatchDog Anti-malware as a part of a Convey Your Personal Weak Driver (BYOVD) assault aimed toward disarming safety options put in on compromised hosts.
The susceptible driver in query is “amsdk.sys” (model 1.0.600), a 64-bit, validly signed Home windows kernel system driver that is assessed to be constructed upon Zemana Anti-Malware SDK.
“This driver, constructed on the Zemana Anti-Malware SDK, was Microsoft-signed, not listed within the Microsoft Weak Driver Blocklist, and never detected by group initiatives like LOLDrivers,” Verify Level stated in an evaluation.
The assault is characterised by a dual-driver technique, the place a recognized susceptible Zemana driver (“zam.exe”) is used for Home windows 7 machines, and the undetected WatchDog driver for techniques that run on Home windows 10 or 11.
The WatchDog Anti-malware driver has been discovered to include a number of vulnerabilities, the at first being the flexibility to terminate arbitrary processes with out verifying whether or not the method is operating as protected (PP/PPL). It is also inclined to native privilege escalation, permitting an attacker to achieve unrestricted entry to the motive force’s system.

The top objective of the marketing campaign, first noticed by Verify Level in late Might 2025, is to leverage these susceptible drivers to neutralize endpoint safety merchandise, creating a transparent path for malware deployment and persistence with out triggering signature-based defenses.
As noticed earlier than, the marketing campaign is designed to ship ValleyRAT (aka Winos 4.0) as the ultimate payload, offering distant entry and management capabilities to the menace actor. The cybersecurity firm stated the assaults make use of an all-in-one loader, encapsulating anti-analysis options, two embedded drivers, antivirus killer logic, and the ValleyRAT DLL downloader in a single binary.
“Upon execution, the pattern performs just a few widespread anti-analysis checks, reminiscent of Anti-VM (detection of digital environments), Anti-Sandbox (detection of execution inside a sandbox), hypervisor detection, and others,” Verify Level stated. “If any of those checks fail, the execution is aborted, and a faux system error message is displayed.”
The downloader is designed to speak with a command-and-control (C2) server to fetch the modular ValleyRAT backdoor onto the contaminated machine.
Following accountable disclosure, Watchdog has launched a patch (model 1.1.100) to handle the LPE threat by implementing a powerful Discretionary Entry Management Record (DACL), whereas not plugging the arbitrary course of termination situation. This, in flip, has had the facet impact of inflicting the attackers to swiftly adapt and incorporate the modified model by altering only a single byte with out invalidating Microsoft’s signature.

“By flipping a single byte within the unauthenticated timestamp discipline, they preserved the motive force’s legitimate Microsoft signature whereas producing a brand new file hash, successfully bypassing hash-based blocklists,” Verify Level famous. “This delicate but environment friendly evasion method mirrors patterns seen in earlier campaigns.”
“This marketing campaign demonstrates how menace actors are transferring past recognized weaknesses to weaponize unknown, signed drivers—a blind spot for a lot of protection mechanisms. The exploitation of a Microsoft-signed, beforehand unclassified susceptible driver, mixed with evasive methods reminiscent of signature manipulation, represents a complicated and evolving menace.”
Silver Fox, additionally known as SwimSnake, The Nice Thief of Valley (or Valley Thief), UTG-Q-1000, and Void Arachne, is assessed to be extremely energetic since early final yr, primarily concentrating on Chinese language-speaking victims utilizing faux web sites masquerading as Google Chrome, Telegram, and synthetic intelligence (AI)-powered instruments like DeepSeek to distribute distant entry trojans like ValleyRAT.
In accordance with Chinese language cybersecurity vendor Antiy, the hacking group is believed to have been round because the second half of 2022, concentrating on home customers and corporations with an try and steal secrets and techniques and defraud them.
“The cybercriminal group primarily spreads malicious recordsdata via instantaneous messaging software program (WeChat, Enterprise WeChat, and many others. ), search engine search engine optimisation promotion, phishing emails, and many others.,” the corporate stated. “The ‘SwimSnake’ cybercriminal group remains to be steadily updating malware and AV evasion strategies.”
The assaults make use of trojanized variations of open-source software program, malicious applications constructed utilizing the Qt framework, or MSI installers disguised as Youdao, Sogou AI, WPS Workplace, and DeepSeek to serve Valley RAT, together with its on-line module that may seize screenshots of WeChat and on-line banks.

The event comes as QiAnXin additionally detailed a separate marketing campaign mounted by the “Finance Group” inside Silver Fox that targets monetary personnel and managers of enterprises and establishments, aiming to plunder delicate monetary data or instantly revenue via fraud.
These assaults leverage phishing lures associated to tax audits, digital invoices, subsidy bulletins, and personnel transfers to deceive customers into operating distant entry trojans, whereas counting on official cloud providers reminiscent of Alibaba Cloud OSS and Youdao Cloud Notes to host malicious payloads in an try and sidestep detection.
The Finance Group is among the 4 sub-clusters a part of Silver Fox, the opposite three being the Information and Romance Group, the Design and Manufacturing Group, and the Black Watering Gap Group.
Curiously, after the Finance Group features management of a sufferer’s laptop via strategies like watering gap assaults and phishing, they take over the sufferer’s social media accounts and leverage them to ship phishing QR codes to varied WeChat group chats with the objective of harvesting checking account numbers and passwords from group members, finally draining funds from their financial institution accounts for revenue.
“UTG-Q-1000 is among the most energetic and aggressive cybercrime teams in China lately. Their operations are extremely organized, technically subtle, and financially motivated,” QiAnXin stated. “They’ve established a whole black-market revenue chain involving: espionage (knowledge theft), distant management by way of malware, and monetary fraud and phishing.”

The Hacker News Tags:Deploy, Driver, Exploits, Fox, Malware, MicrosoftSigned, Silver, ValleyRAT, WatchDog

Post navigation

Previous Post: Critical Qualcomm Vulnerabilities Allow Attackers to Execute Arbitrary Code Remotely
Next Post: HashiCorp Vault Vulnerability Let Attackers to Crash Servers

Related Posts

A Critical Part of Enterprise AI Governance The Hacker News
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks The Hacker News
Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud The Hacker News
1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub The Hacker News
Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally The Hacker News
SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False
  • New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
  • Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False
  • New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
  • Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News