Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China

Posted on December 4, 2025December 4, 2025 By CWS

The risk actor often called Silver Fox has been noticed orchestrating a false flag operation to imitate a Russian risk group in assaults focusing on organizations in China.
The search engine marketing (web optimization) poisoning marketing campaign leverages Microsoft Groups lures to trick unsuspecting customers into downloading a malicious setup file that results in the deployment of ValleyRAT (Winos 4.0), a identified malware related to the Chinese language cybercrime group. The exercise has been underway since November 2025.
“This marketing campaign targets Chinese language-speaking customers, together with these inside Western organizations working in China, utilizing a modified ‘ValleyRAT’ loader containing Cyrillic parts – seemingly an intentional transfer to mislead attribution,” ReliaQuest researcher Hayden Evans mentioned in a report shared with The Hacker Information.
ValleyRAT, a variant of Gh0st RAT, permits risk actors to remotely management contaminated methods, exfiltrate delicate information, execute arbitrary instructions, and keep long-term persistence inside focused networks. It is price noting that using Gh0st RAT is primarily attributed to Chinese language hacking teams.

The usage of Groups for the web optimization poisoning marketing campaign marks a departure from prior efforts which have leveraged different widespread packages like Google Chrome, Telegram, WPS Workplace, and DeepSeek to activate the an infection chain.
The web optimization marketing campaign is supposed to redirect customers to a bogus web site that options an choice to obtain the supposed Groups software program. In actuality, a ZIP file named “MSTчamsSetup.zip” is retrieved from an Alibaba Cloud URL. The archive makes use of Russian linguistic parts to confuse attribution efforts.
Current inside the file is “Setup.exe,” a trojanized model of Groups that is engineered to scan working processes for binaries associated to 360 Whole Safety (“360tray.exe”), configure Microsoft Defender Antivirus exclusions, and write the trojanized model of the Microsoft installer (“Verifier.exe”) to the “AppDataLocal” path and execute it.
The malware proceeds to write down extra recordsdata, together with “AppDataLocalProfiler.json,” “AppDataRoamingEmbarcaderoGPUCache2.xml,” “AppDataRoamingEmbarcaderoGPUCache.xml,” and “AppDataRoamingEmbarcaderoAutoRecoverDat.dll.”
Within the subsequent step, it hundreds information from “Profiler.json” and “GPUcache.xml,” and launches the malicious DLL into the reminiscence of “rundll32.exe,” a legit Home windows course of, in order to fly beneath the radar. The assault strikes to the ultimate stage with the malware establishing a connection to an exterior server to fetch the ultimate payload to facilitate distant management.

“Silver Fox’s goals embody monetary acquire by theft, scams, and fraud, alongside the gathering of delicate intelligence for geopolitical benefit,” ReliaQuest mentioned. “Targets face quick dangers comparable to information breaches, monetary losses, and compromised methods, whereas Silver Fox maintains believable deniability, permitting it to function discreetly with out direct authorities funding.”
The disclosure comes as Nextron Programs highlighted one other ValleyRAT assault chain that makes use of a trojanized Telegram installer as the place to begin to kick off a multi-stage course of that finally delivers the trojan. This assault can be notable for leveraging the Convey Your Personal Susceptible Driver (BYOVD) approach to load “NSecKrnl64.sys” and terminate safety resolution processes.

“This installer units a harmful Microsoft Defender exclusion, levels a password-protected archive along with a renamed 7-Zip binary, after which extracts a second-stage executable,” safety researcher Maurice Fielenbach mentioned.
“That second-stage orchestrator, males.exe, deploys extra elements right into a folder beneath the general public consumer profile, manipulates file permissions to withstand cleanup, and units up persistence by a scheduled process that runs an encoded VBE script. This script in flip launches a weak driver loader and a signed binary that sideloads the ValleyRAT DLL.”

Males.exe can be answerable for enumerating working processes to determine endpoint security-related processes, in addition to loading the weak “NSecKrnl64.sys” driver utilizing “NVIDIA.exe” and executing ValleyRAT. Moreover, one of many key elements dropped by the orchestrator binary is “bypass.exe,” which allows privilege escalation by the use of a Person Account Management (UAC) bypass.
“On the floor, victims see a traditional installer,” Fielenbach mentioned. “Within the background, the malware levels recordsdata, deploys drivers, tampers with defenses, and eventually launches a ValleyRat beacon that retains long-term entry to the system.”

The Hacker News Tags:China, Fake, Fox, Installer, Malware, Microsoft, Silver, Spread, Teams, ValleyRAT

Post navigation

Previous Post: Corporate Users 3x More Likely Targeted by Phishing Than Malware – SpyCloud Report
Next Post: Prompt Injection Vulnerability in GitHub Actions Hits Fortune 500 Firms

Related Posts

Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day The Hacker News
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business The Hacker News
Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems The Hacker News
$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections The Hacker News
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse The Hacker News
China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark