Category: Uncategorized

  • Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware

    Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware


    The threat actor known as Silver Fox has turned its focus to India, using income tax-themed lures in phishing campaigns to distribute a modular remote access trojan called ValleyRAT (aka Winos 4.0).

    “This sophisticated attack leverages a complex kill chain involving DLL hijacking and the modular Valley RAT to ensure persistence,” CloudSEK researchers Prajwal Awasthi and Koushik Pal said in an analysis published last week.

    Also tracked as SwimSnake, The Great Thief of Valley (or Valley Thief), UTG-Q-1000, and Void Arachne, Silver Fox is the name assigned to an aggressive cybercrime group from China that has been active since 2022.

    It has a track record of orchestrating a variety of campaigns whose motives range from espionage and intelligence collection to financial gain, cryptocurrency mining, and operational disruption, making it one of the few hacking crews with a multi-pronged approach to their intrusion activity.

    Primarily focused on Chinese-speaking individuals and organisations, Silver Fox’s victimology has broadened to include organizations operating in the public, financial, medical, and technology sectors. Attacks mounted by the group have leveraged search engine optimization (SEO) poisoning and phishing to deliver variants of Gh0st RAT such as ValleyRAT, Gh0stCringe, and HoldingHands RAT (aka Gh0stBins).

    Cybersecurity

    In the infection chain documented by CloudSEK, phishing emails containing decoy PDFs purported to be from India’s Income Tax Department are used to deploy ValleyRAT. Specifically, opening the PDF attachment takes the recipient to the “ggwk[.]cc” domain, from where a ZIP file (“tax affairs.zip”) is downloaded.

    Present within the archive is a Nullsoft Scriptable Install system (NSIS) installer of the same name (“tax affairs.exe”), which, in turn, leverages a legitimate executable associated with Thunder (“thunder.exe”), a download manager for Windows developed by Xunlei, and a rogue DLL (“libexpat.dll”) that’s sideloaded by the binary.

    The DLL, for its part, disables the Windows Update service and serves as a conduit for a Donut loader, but not before performing various anti-analysis and anti-sandbox checks to ensure that the malware can run unimpeded on the compromised host. The lander then injects the final ValleyRAT payload into a hollowed “explorer.exe” process.

    ValleyRAT is designed to communicate with an external server and await further commands. It implements a plugin-oriented architecture to extend its functionality in an ad hoc manner, thereby allowing its operators to deploy specialized capabilities to facilitate keylogging, credential harvesting, and defense evasion.

    “Registry-resident plugins and delayed beaconing allow the RAT to survive reboots while remaining low-noise,” CloudSEK said. “On-demand module delivery enables targeted credential harvesting and surveillance tailored to victim role and value.”

    The disclosure comes as NCC Group said it identified an exposed link management panel (“ssl3[.]space”) used by Silver Fox to track download activity related to malicious installers for popular applications, including Microsoft Teams, to deploy ValleyRAT. The service hosts information related to –

    • Web pages hosting backdoor installer applications
    • The number of clicks a download button on a phishing site receives per day
    • Cumulative number of clicks a download button has received since launch

    The bogus sites created by Silver Fox have been found to impersonate CloudChat, FlyVPN, Microsoft Teams, OpenVPN, QieQie, Santiao, Signal, Sigua, Snipaste, Sogou, Telegram, ToDesk, WPS Office, and Youdao, among others. An analysis of the origin IP addresses that have clicked on the download links has revealed that at least 217 clicks originated from China, followed by the U.S. (39), Hong Kong (29), Taiwan (11), and Australia (7).

    “Silver Fox leveraged SEO poisoning to distribute backdoor installers of at least 20 widely used applications, including communication tools, VPNs, and productivity apps,” researchers Dillon Ashmore and Asher Glue said. “These primarily target Chinese-speaking individuals and organisations in China, with infections dating back to July 2025 and additional victims across Asia-Pacific, Europe, and North America.”

    Cybersecurity

    Distributed via these sites is a ZIP archive that contains an NSIS-based installer that’s responsible for configuring Microsoft Defender Antivirus exclusions, establishing persistence using scheduled tasks, and then reaching out to a remote server to fetch the ValleyRAT payload.

    The findings coincide with a recent report from ReliaQuest, which attributed the hacking group to a false flag operation mimicking a Russian threat actor in attacks targeting organizations in China using Teams-related lure sites in an attempt to complicate attribution efforts.

    “Data from this panel shows hundreds of clicks from mainland China and victims across Asia-Pacific, Europe, and North America, validating the campaign’s scope and strategic targeting of Chinese-speaking users,” NCC Group said.



    Source link

  • Gen Mamady Doumbouya takes lead in controversial election as social media is restricted

    Gen Mamady Doumbouya takes lead in controversial election as social media is restricted


    Guinea’s junta leader Gen Mamady Doumbouya has taken a huge lead in a presidential election his main challengers were barred from contesting, initial results show.

    Gen Doumbouya is hoping to legitimise his rule after seizing power in a coup four years ago.

    A civil society group campaigning for the return of civilian rule condemned the election as a “charade”, while opposition candidates said the poll was marred by irregularities.

    On Monday, internet monitoring organisation NetBlocks reported that access to social media platforms TikTok, YouTube and Facebook had been restricted as Guineans waited for the full results.

    There has been no official comment on the restrictions, but opponents see it as an attempt by the junta to stifle criticism of the results.

    Gen Doumbouya, 41, won more than 80% of the vote in numerous districts in capital city Conakry, according to official partial results read out on television by Djenabou Toure, head of the General Directorate of Elections.

    Gen Doumbouya had a big lead in several other areas as well, including Boffa and Fria in the west, Gaoual in the north-west, northern Koundara and Labe, and Nzerekore in the south-east.

    After overthrowing then-83-year-old President Alpha Condé in 2021, he promised not to seek election and to hand power to a civilian.

    “Neither I nor any member of this transition will be a candidate for anything… As soldiers, we value our word very much,” he said at the time.

    Gen Doumbouya broke his promise by putting his name on the ballot after a new constitution, implemented in September, permitted him to run for office.

    Eight other candidates took part in Sunday’s election, but with the exclusion of main opposition parties RPG Arc en Ciel and UFDG, none of the participants have a solid political footing.

    Although he is popular with many of Guinea’s youth, Gen Doumbouya has been criticised for restricting opposition activities, banning protests and stifling press freedom in the run-up to the elections.

    The general justified deposing Condé on similar charges – including rampant corruption, disregard for human rights and economic mismanagement.

    Guinea has the world’s largest bauxite reserves and some of its richest iron ore. Last month, authorities launched the gigantic Simandou iron-ore mine to widespread anticipation.

    However, over half of the population lives in poverty, according to World Bank figures.



    Source link

  • Eurostar cancels all trains out of London after Channel Tunnel power outage

    Eurostar cancels all trains out of London after Channel Tunnel power outage


    Thomas Mackintoshand

    Nicky Schiller,London St Pancras International

    Kelly North and Bethany Massey-Chase tell the BBC how they’ve had to re-book their Eurostar service to Paris

    Eurostar has cancelled all trains out of London towards Paris, Amsterdam and Brussels until further notice after a power outage in the Channel Tunnel caused a Le Shuttle train to fail.

    Staff at London St Pancras International station have told Eurostar passengers to postpone their travel plans and re-book for a later date.

    By midday, at least a dozen Eurostar services between the UK, France, Belgium and the Netherlands had been cancelled – many more had also been delayed or altered.

    Train traffic will “gradually resume” this afternoon, according to the company which operates the Channel Tunnel.

    Elsewhere, Eurotunnel service Le Shuttle – which carries road vehicles and passengers through the tunnel – has also suspended trains between Folkestone and Calais due to what it described as a “power supply issue” which occurred overnight.

    National Rail said the major disruption is expected to last until further notice.

    Eurostar said: “Services to and from London are suspended until further notice due to overhead power supply issues in the Channel Tunnel, followed by a failed Le Shuttle train.

    “We advise our customers to re-book their journey for another day, with free exchanges available.

    “We apologise for the disruption and will continue to keep customers updated with the latest information.”

    According to Eurostar, passengers can rearrange their plans free of charge or can cancel their booking and get a refund or an e-voucher.

    The broken Le Shuttle train has been moved out of the Channel Tunnel and Eurotunnel expects to resume services around 15:00 CET (14:00 GMT).

    “Our teams are working to restore the situation as quickly as possible,” Le Shuttle said in a statement.

    “Waiting times will be adjusted throughout the day. Eurotunnel apologises for the inconvenience and thanks its customers for their patience and understanding.”

    On its website Le Shuttle says check-in and border control services are experiencing lengthy delays.

    Reuters A passenger carries a suitcaseReuters

    Ben Clark, from Bedfordshire, told the BBC he has been stuck on-board Le Shuttle in Calais with his wife and three daughters since 10:00 local time (09:00 GMT).

    “The first two-and-a-half hours weren’t too bad but the girls have got restless in the last half an hour so we’ve let them run around the boarding carriage to burn off some energy,” he said.

    “Some people are getting angry but there’s nothing that can be done, others are sleeping in their cars. We have used up our snacks and now have no plan B or C.”

    Reuters Passengers wait with luggage next to a departure board showing cancelled trainsReuters

    Eurostar passengers booked to travel on Tuesday have been told to reschedule their travel if they can

    On the UK side at Folkestone, Le Shuttle said there is a delay of around three-and-a-half hours to the booked departure time.

    Matthew Webber, from Suffolk, said he has been stuck for hours and is unclear whether he and his group will be able to continue their journey.

    “Not a lot of information being given out which is poor,” he told the BBC.

    “Lots of queues and everyone is waiting to get on the Tunnel. The conditions are very busy and people are leaving to get a ferry.”

    BBC / Nicky Schiller Departure boards at St Pancras station showing cancellations to Amsterdam, Paris and Brussels servicesBBC / Nicky Schiller

    Services between London and France, Belgium and the Netherlands have been hit

    At the Calais terminal in France the delay is currently around three hours.

    Steph Roberts, from Ashford, Kent, told the BBC she has been stuck at the Calais terminal with her husband Robert and bulldog Dempsey since 10:30.

    She had spent two weeks in France seeing her parents and family over Christmas.

    Ms Roberts said: “We’ve not had any updates or been given any food or water.

    “We’ve just been spending the time going through social media and reading magazines. I’ve also gone out to take the dog for a couple of walks.”

    PA Media Passengers queue to enter the Eurotunnel site in Folkestone in KentPA Media

    Cars and coaches have started to queue up outside the Eurotunnel terminal in Folkestone

    Your Voice banner

    Eurostar disruption: Are you affected?

    You can get in touch in the following ways:

    Email: bbcyourvoice@bbc.co.uk

    WhatsApp: +44 7756 165803

    Upload your pictures and video

    Please read our terms & conditions and privacy policy

    In some cases a selection of your comments and questions will be published, displaying your name and location as you provide it unless you state otherwise. Your contact details will never be published.



    Source link