Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Silver Fox APT Hackers Leveraging Vulnerable Driver to Attack Windows 10 and 11 Systems by Evading EDR/AV

Posted on August 29, 2025August 29, 2025 By CWS

Rising in mid-2025, a classy marketing campaign attributed to the Silver Fox APT has begun exploiting a beforehand unreported weak driver to compromise fashionable Home windows environments.

This marketing campaign leverages the WatchDog Antimalware driver (amsdk.sys, model 1.0.600), a Microsoft-signed part constructed on the Zemana Anti-Malware SDK.

Weak valid-signed WatchDog Antimalware Driver (Supply – Test Level)

By abusing its arbitrary course of termination functionality, menace actors bypass endpoint detection and response (EDR) and antivirus (AV) protections on totally patched Home windows 10 and 11 methods with out triggering signature-based defenses.

Preliminary phases of the assault contain deploying a self-contained loader that embeds a number of drivers and anti-analysis layers.

Contaminated machines obtain a loader binary that first performs checks towards digital machines, sandboxes, and identified evaluation environments.

As soon as these checks move, the loader drops two drivers—one legacy Zemana-based driver for compatibility with older methods, and the newer WatchDog Antimalware driver for contemporary targets—right into a newly created C:Program FilesRunTime listing.

Test Level researchers famous that each drivers are then registered as kernel companies: the legacy driver underneath ZAM.exe for Home windows 7, and amsdk.sys for Home windows 10/11.

The loader’s “Termaintor” service ensures persistence for the executed loader stub, whereas Amsdk_Service facilitates driver loading.

Following driver registration, the marketing campaign’s customized EDR/AV killer logic opens a deal with to the weak driver’s machine namespace (.amsdk) and points IOCTL calls to register the malicious course of and terminate protected safety service processes.

The termination routine reads from a Base64-encoded course of listing of over 190 entries—spanning fashionable antivirus and endpoint safety companies—and sends IOCTL_TERMINATE_PROCESS instructions by way of DeviceIoControl to eradicate working defenses.

Course of termination (Supply – Test Level)

By abusing the driving force’s lack of a FILE_DEVICE_SECURE_OPEN flag and lacking PP/PPL checks, Silver Fox achieves dependable AV evasion.

Test Level analysts recognized that after terminating safety processes, the loader decodes and injects a UPX-packed ValleyRAT downloader module into reminiscence.

This module connects to Chinese language-hosted C2 servers, decrypts configuration visitors utilizing a easy XOR cipher, and fetches the ultimate ValleyRAT backdoor payload.

ValleyRAT (“Winos”) gives full distant entry capabilities together with command execution and information exfiltration, confirming the marketing campaign’s attribution to Silver Fox.

Detection Evasion via Signed-Driver Manipulation

Though WatchDog launched a patched driver (wamsdk.sys, model 1.1.100) following disclosure, Silver Fox shortly tailored by flipping a single byte inside the unauthenticated attributes of the driving force’s signature timestamp.

This delicate modification preserved the Microsoft Authenticode signature whereas producing a brand new file hash, successfully bypassing hash-based blocklists with out altering signature validity.

The altered driver is then seamlessly loaded heading in the right direction methods, persevering with the exploitation cycle.

This system underscores a broader pattern: adversaries weaponizing authentic, signed drivers and manipulating timestamp countersigns to evade each static and behavior-based detection mechanisms.

Increase your SOC and assist your staff shield what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:APT, Attack, Driver, EDRAV, Evading, Fox, Hackers, Leveraging, Silver, Systems, Vulnerable, Windows

Post navigation

Previous Post: Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations
Next Post: PhpSpreadsheet Library Vulnerability Enables Attackers to Feed Malicious HTML Input

Related Posts

Windows 11 Gets New AI-Powered Features Cyber Security News
Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China Cyber Security News
Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Cyber Security News
New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals Cyber Security News
OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials Cyber Security News
Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads
  • In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks
  • VerifTools Fake ID Operation Dismantled by Law Enforcement
  • Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems
  • Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads
  • In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks
  • VerifTools Fake ID Operation Dismantled by Law Enforcement
  • Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems
  • Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News