Silver Fox uses tax-themed phishing to deliver ValleyRAT now

Silver Fox deploys India tax-themed phishing to deliver ValleyRAT via NSIS installer, DLL hijacking and process hollowing; SEO-poisoned pages and an exposed link panel reveal hundreds of global clicks

  • Silver Fox is using India-themed tax phishing to spread the modular remote-access trojan ValleyRAT.
  • Attackers use decoy PDFs that download an NSIS installer which sideloads a rogue DLL and injects the RAT into a hollowed system process.
  • A link-management panel tracked by NCC Group shows SEO-poisoned pages and hundreds of clicks from multiple countries, confirming campaign scale.

Silver Fox, a cybercrime group active since 2022, has targeted users in India with income tax-themed phishing that delivers the remote-access trojan ValleyRAT, researchers reported in an analysis published last week by CloudSEK. “This sophisticated attack leverages a complex kill chain involving DLL hijacking and the modular Valley RAT to ensure persistence,” the report said.

- Advertisement -

Phishing emails include PDF decoys that point victims to the “ggwk[.]cc” domain and trigger a ZIP download named “tax affairs.zip.” The archive contains an NSIS installer (a scriptable installer system) named “tax affairs.exe” that uses a legitimate Thunder executable (thunder.exe) to sideload a malicious DLL. DLL hijacking is an attack that forces a program to load a malicious library instead of the intended one.

The dropped DLL disables the Windows Update service, performs anti-analysis checks, and acts as a conduit for a Donut loader, which is an in-memory payload loader. The chain ends when the installer injects the final ValleyRAT payload into a hollowed explorer.exe process. Process hollowing is a technique where a legitimate process is replaced in memory by malicious code.

ValleyRAT connects to attacker-controlled servers and supports on-demand modules for tasks such as keylogging and credential theft. “Registry-resident plugins and delayed beaconing allow the RAT to survive reboots while remaining low-noise,” CloudSEK stated.

Separately, NCC Group identified an exposed link management panel (“ssl3[.]space”) used to track download activity for fake installers. The panel logged pages Hosting backdoor installers, daily click counts, and cumulative clicks. NCC analysts noted the attackers impersonated apps such as Microsoft Teams, OpenVPN, Signal, Telegram, and others, and recorded at least 217 clicks from China, 39 from the U.S., 29 from Hong Kong, 11 from Taiwan, and 7 from Australia. “Data from this panel shows hundreds of clicks from mainland China and victims across Asia-Pacific, Europe, and North America,” NCC Group said.

- Advertisement -

Researchers also linked the campaign to SEO poisoning that distributed backdoored installers for at least 20 common applications, as described by NCC researchers Dillon Ashmore and Asher Glue.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Russia Blocks WhatsApp, Pushing Users to State App

Russian authorities moved to fully block Meta's WhatsApp on February 12, 2026, to funnel...

META to Build $10B Indiana Data Center for US AI Push

Meta is investing $10 billion in a new U.S. data center in Indiana to...

Strategy shifts Bitcoin buy plan to focus on preferred stock

Strategy is shifting its capital strategy to fund Bitcoin purchases from common stock sales...

Apple Releases Updates for Exploited Zero-Day Flaw

Apple has released emergency security updates for all major platforms including iOS, macOS, and...

Ethereum Staking Hits New Record: 36.8M ETH Locked

Ethereum's staking ratio has reached a new all-time high, surpassing 30% of its total...

Must Read

How to Choose a Cryptocurrency Exchange: Major Risks and Expert Advice

During the bitcoin frenzy, in late 2017, Coinbase, one of the key players in the global cryptocurrency market, stopped trading operations. At a point...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!