Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why Security Validation Is Becoming Agentic

March 24, 2026

Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage

March 24, 2026

ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers

March 24, 2026
Facebook X (Twitter) Instagram
Wednesday, March 25
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage
News

Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage

Team-CWDBy Team-CWDMarch 24, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A series of cyber campaigns linked to the Silver Fox intrusion group has revealed a shift in tactics between 2025 and 2026, combining espionage-style operations with financially motivated cybercrime. 

The campaigns, observed by cybersecurity firm Sekoia, targeted organizations across South Asia using phishing lures themed around tax authorities and financial documents, according to a recent threat intelligence report.

The researchers found that the group’s operations evolved across three distinct waves, moving from advanced malware delivery to remote management tools and later to a custom Python-based credential stealer disguised as a WhatsApp application.

Campaign Evolution and Techniques

Silver Fox initially used malicious PDF attachments in phishing emails impersonating national tax authorities. These emails were designed to trick finance staff into opening documents that deployed ValleyRAT malware through DLL side-loading techniques.

Later campaigns changed tactics. Instead of sending attachments directly, attackers used phishing websites that hosted downloadable archives containing malware or remote monitoring tools.

By early 2026, the group had shifted again, distributing a Python-based stealer designed to collect credentials and sensitive files.

Key characteristics of the campaigns included:

  • Phishing emails impersonating tax authorities or payroll departments

  • Use of SEO poisoning and malicious ads to distribute malware

  • Deployment of multiple tools, including ValleyRAT, HoldingHands and custom stealers

  • Targeting organizations across Taiwan, Japan, Malaysia, India, Indonesia, Singapore, Thailand and the Philippines

Dual Motives: Espionage and Profit

Researchers at Sekoia believe Silver Fox operates with dual objectives. Some campaigns appeared aligned with intelligence collection, particularly those targeting Taiwanese organizations during tax audit periods. Others were broader and more consistent with profit-driven cybercrime operations.

Read more on cyber espionage: Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

The group’s continued use of ValleyRAT alongside other tools suggests a modular approach that allows attackers to adapt quickly while maintaining long-term access to compromised systems. Meanwhile, the use of legitimate remote management software and simple credential stealers indicates ongoing financially motivated activity.

Despite changes in tools and delivery methods, the group’s core tactics remained consistent with tax and finance-themed phishing lures used as the primary entry method. These phishing messages allowed attackers to target multiple industries and sectors.

The report concluded that Silver Fox is likely maintaining both opportunistic cybercrime operations and more strategic campaigns, reflecting a broader trend where the line between cybercrime and state-linked cyber activity is increasingly blurred.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers
Next Article Why Security Validation Is Becoming Agentic
Team-CWD
  • Website

Related Posts

News

Why Security Validation Is Becoming Agentic

March 24, 2026
News

ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers

March 24, 2026
News

Dmytro Kuleba to Address the New Cyber Frontline at Infose Europe

March 24, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

2025’s most common passwords were as predictable as ever

January 21, 2026

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.