China-Linked Silver Fox APT Expands Campaign, Deploys New ABCDoor Malware via Tax-Themed Phishing

Silver Fox APT Targets India and Russia with New 'ABCDoor' Backdoor

HIGH
May 6, 2026
May 9, 2026
5m read
Threat ActorPhishingMalware

Related Entities(initial)

Threat Actors

Silver Fox

Organizations

Other

ABCDoorValleyRATRustSL

Full Report(when first published)

Executive Summary

The China-affiliated Advanced Persistent Threat (APT) group known as Silver Fox has been observed conducting a new wave of cyber-espionage attacks. According to research from Kaspersky, the campaign, which started in December 2025, has expanded the group's typical geographical focus to include targets in India and Russia. The attackers employ socially engineered phishing emails with tax-themed lures, timed to coincide with regional tax seasons, to deliver their malware. The multi-stage infection process ultimately deploys two backdoors: the known ValleyRAT and a new, previously unseen Python-based backdoor dubbed ABCDoor. The campaign has impacted multiple sectors, including industrial, consulting, retail, and transportation.


Threat Overview

The attack is a classic phishing campaign designed to gain initial access and deploy backdoors for long-term espionage.

  1. Initial Access (Phishing): The campaign begins with phishing emails tailored to the target region. The emails use lures related to national tax authorities and contain malicious attachments.
    • India Campaign (Dec 2025): Emails contained RAR archives with executables disguised with PDF icons.
    • Russia Campaign (Jan 2026): Emails used PDF attachments with external links that downloaded a malicious ZIP archive, a technique to bypass email gateways.
  2. Loader Execution: The initial executable is a modified version of RustSL, an open-source shellcode loader written in Rust. It performs environment checks before proceeding.
  3. Payload Delivery: The RustSL loader downloads and executes the primary payload, ValleyRAT.
  4. Secondary Payload: ValleyRAT is then used to deliver the final payload, the new ABCDoor backdoor, which provides capabilities for data exfiltration and remote control.

Technical Analysis

The Silver Fox group demonstrates tactical agility by adapting its phishing methods for different target regions. The use of PDF files with external links against Russian targets is a deliberate attempt to evade security scanners that might block direct executable attachments but are less likely to flag a PDF.

The use of a multi-stage malware deployment is a common APT tactic. RustSL acts as a lightweight, evasive first stage. ValleyRAT provides a flexible, modular platform for C2 and further actions. The introduction of ABCDoor, a new Python-based backdoor, suggests the group is actively developing its toolkit to evade signature-based detection.

MITRE ATT&CK Techniques Observed:

Impact Assessment

The primary goal of the Silver Fox APT is likely intelligence gathering for economic or state advantage. By targeting industrial, consulting, and transportation sectors, the group may be seeking to steal intellectual property, trade secrets, or sensitive business information. The high volume of phishing emails (over 1,600 in two months) indicates a broad and persistent campaign. A successful compromise by ABCDoor or ValleyRAT would give the attackers long-term access to a victim's network, allowing for extensive data exfiltration and monitoring.

Detection & Response

  • Email Security: Enhance email gateway filtering to better detect and quarantine emails with malicious archives (RAR, ZIP) or PDFs containing suspicious external links. Use sandboxing to analyze attachments before delivery.
  • Process Analysis (D3-PA): Monitor for the execution of unsigned executables from temporary directories or user download folders. EDR solutions should be configured to alert on processes that exhibit loader-like behavior, such as allocating executable memory and writing to it.
  • Network Traffic Analysis (D3-NTA): Identify and baseline C2 traffic from known RATs like ValleyRAT. Look for suspicious outbound connections from processes that should not be communicating with the internet.
  • Endpoint Detection: Deploy EDR rules to detect the execution of Python scripts from unusual locations or by unexpected parent processes, which could indicate the presence of ABCDoor.

Mitigation

  • User Training: This is the most critical mitigation for phishing attacks. Train employees to be suspicious of unsolicited emails, especially those with urgent calls to action related to sensitive topics like taxes or finances. Teach them to never open attachments or click links from unknown senders and to report suspicious emails.
  • Application Hardening (D3-AH): Configure email clients and office applications to block or warn users about opening certain file types or content with external links.
  • Executable Denylisting (D3-EDL): Use application control to prevent the execution of unauthorized executables, scripts, and loaders. This can block the initial RustSL payload from running.
  • Endpoint Protection: Ensure that antivirus and EDR solutions are up-to-date and configured to detect and block known RATs like ValleyRAT and suspicious Python execution.

Timeline of Events

1
December 1, 2025
The phishing campaign targeting Indian entities began.
2
January 1, 2026
The phishing campaign expanded to target Russian organizations.
3
May 6, 2026
This article was published

Article Updates

May 9, 2026

SilverFox campaign expands to Indonesia & South Africa; ABCDoor backdoor capabilities detailed, including screen streaming and clipboard data theft.

MITRE ATT&CK Mitigations

The most effective defense against this campaign's initial access vector is user training focused on identifying and reporting phishing emails.

Use email security gateways to scan and block malicious attachments and links, preventing the initial payload from reaching the user.

Mapped D3FEND Techniques:

Implement application control or allowlisting to prevent the execution of unauthorized loaders and backdoors like RustSL, ValleyRAT, and ABCDoor.

Mapped D3FEND Techniques:

Timeline of Events

1
December 1, 2025

The phishing campaign targeting Indian entities began.

2
January 1, 2026

The phishing campaign expanded to target Russian organizations.

Sources & References(when first published)

Silver Fox Campaign Deploys ValleyRAT Through Tax-Themed Lures
Cyber Press (cyberpress.com) May 5, 2026
Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia
Dark Reading (darkreading.com) May 4, 2026
China-linked Silver Fox hackers target Russia with new malware
BleepingComputer (bleepingcomputer.com) May 2, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Silver FoxAPTChinaABCDoorValleyRATPhishingIndiaRussia

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.