Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Silver Fox Exploits EV Certificates in Malware Attack

Silver Fox Exploits EV Certificates in Malware Attack

Posted on March 26, 2026 By CWS

The advanced persistent threat group, Silver Fox, also known by aliases such as Void Arachne and SwimSnake, has been actively engaging in a sophisticated malware campaign targeting Chinese-speaking individuals. This campaign leverages the AtlasCross Remote Access Trojan (RAT) to infiltrate systems and exploit stolen Extended Validation (EV) code-signing certificates.

Utilizing Typosquatted Domains

Security researcher Maurice Fielenbach from Hexastrike uncovered that Silver Fox employs typosquatted domains, mimicking well-known software brands like Surfshark, Signal, and Zoom. These fake domains are crucial to their strategy, as they use stolen EV certificates to bypass security measures and establish persistence within enterprise networks.

The malicious actors have created an elaborate infrastructure to host convincing landing pages that resemble authentic software sites. Victims downloading software from these sites receive a ZIP archive containing a cleverly disguised installer, which includes a trojanized component designed to evade detection.

Advanced Malware Techniques

The attackers have enhanced their strategy by signing their payloads with a stolen EV certificate from a Vietnamese company, “DUC FABULOUS CO.,LTD,” valid until May 2027. This outer wrapper, once executed, drops a compromised Autodesk component alongside legitimate applications to reduce suspicion among users.

The malicious loader dynamically resolves its APIs, effectively avoiding static analysis. It then extracts a hidden configuration that retrieves a second-stage payload from a command-and-control server, ensuring a fileless execution of the AtlasCross RAT.

AtlasCross RAT and PowerChell Framework

Central to this operation is the AtlasCross RAT, which utilizes a custom PowerShell execution engine called PowerChell. This framework integrates the .NET Common Language Runtime directly within the malware, allowing it to run PowerShell scripts without triggering typical security alerts.

To maintain its stealth, PowerChell disables Windows defenses and uses encryption for communication with the C2 infrastructure. The RAT also disrupts connections from Chinese security products to prevent the reception of updates, further solidifying its presence on infected systems.

Silver Fox’s evolution from process termination to network-level disruption marks their growth as a sophisticated threat actor. Security teams are advised to monitor for unusual processes and audit scheduled tasks to detect signs of PowerChell activity.

For detailed indicators of compromise, including domains and certificates used in this campaign, cybersecurity teams should remain vigilant and proactively defend against these evolving threats.

Cyber Security News Tags:APT group, AtlasCross RAT, C2 infrastructure, cyber threat, Cybersecurity, data protection, EV certificates, Malware, network security, Phishing, RAT malware, Silver Fox, typosquatting

Post navigation

Previous Post: Chinese Cyber Threats Breach Global Telecom Systems
Next Post: Vulnerability in Claude Extension Exposes Users to XSS Attacks

Related Posts

Charging Cable that Hacks your Device to Record Keystrokes and Control Wi-Fi Charging Cable that Hacks your Device to Record Keystrokes and Control Wi-Fi Cyber Security News
CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks Cyber Security News
OpenAI Launches  ChatGPT Go Plan with Unlimited Access to GPT-5 OpenAI Launches $4 ChatGPT Go Plan with Unlimited Access to GPT-5 Cyber Security News
Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks Cyber Security News
Critical Flaws in Google Looker Studio Allow Data Breach Critical Flaws in Google Looker Studio Allow Data Breach Cyber Security News
North Korean Malware Targets macOS via Fake Zoom SDK Update North Korean Malware Targets macOS via Fake Zoom SDK Update Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Linux ‘Dirty Frag’ Vulnerability Under Investigation
  • Google’s reCAPTCHA Update Challenges Privacy Advocates
  • Supply Chain Attack Hits Checkmarx Jenkins Plugin
  • Vidar Malware Exploits Browser Data and Crypto Wallets
  • Canvas Restores Access After Cyberattack Disruption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Linux ‘Dirty Frag’ Vulnerability Under Investigation
  • Google’s reCAPTCHA Update Challenges Privacy Advocates
  • Supply Chain Attack Hits Checkmarx Jenkins Plugin
  • Vidar Malware Exploits Browser Data and Crypto Wallets
  • Canvas Restores Access After Cyberattack Disruption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark