The China-affiliated Advanced Persistent Threat (APT) group known as Silver Fox has been observed conducting a new wave of cyber-espionage attacks. According to research from Kaspersky, the campaign, which started in December 2025, has expanded the group's typical geographical focus to include targets in India and Russia. The attackers employ socially engineered phishing emails with tax-themed lures, timed to coincide with regional tax seasons, to deliver their malware. The multi-stage infection process ultimately deploys two backdoors: the known ValleyRAT and a new, previously unseen Python-based backdoor dubbed ABCDoor. The campaign has impacted multiple sectors, including industrial, consulting, retail, and transportation.
The attack is a classic phishing campaign designed to gain initial access and deploy backdoors for long-term espionage.
The Silver Fox group demonstrates tactical agility by adapting its phishing methods for different target regions. The use of PDF files with external links against Russian targets is a deliberate attempt to evade security scanners that might block direct executable attachments but are less likely to flag a PDF.
The use of a multi-stage malware deployment is a common APT tactic. RustSL acts as a lightweight, evasive first stage. ValleyRAT provides a flexible, modular platform for C2 and further actions. The introduction of ABCDoor, a new Python-based backdoor, suggests the group is actively developing its toolkit to evade signature-based detection.
T1566.001 - Phishing: Spearphishing Attachment: Using malicious RAR and ZIP archives in emails.T1566.002 - Phishing: Spearphishing Link: Using links within PDF attachments to download malware.T1204.002 - User Execution: Malicious File: Relies on the user opening the malicious file from the archive.T1105 - Ingress Tool Transfer: Downloading ValleyRAT and ABCDoor after initial access.T1059.006 - Command and Scripting Interpreter: Python: ABCDoor is a Python-based backdoor.T1027 - Obfuscated Files or Information: Using modified open-source loaders like RustSL to evade detection.The primary goal of the Silver Fox APT is likely intelligence gathering for economic or state advantage. By targeting industrial, consulting, and transportation sectors, the group may be seeking to steal intellectual property, trade secrets, or sensitive business information. The high volume of phishing emails (over 1,600 in two months) indicates a broad and persistent campaign. A successful compromise by ABCDoor or ValleyRAT would give the attackers long-term access to a victim's network, allowing for extensive data exfiltration and monitoring.
SilverFox campaign expands to Indonesia & South Africa; ABCDoor backdoor capabilities detailed, including screen streaming and clipboard data theft.
The most effective defense against this campaign's initial access vector is user training focused on identifying and reporting phishing emails.
Use email security gateways to scan and block malicious attachments and links, preventing the initial payload from reaching the user.
Mapped D3FEND Techniques:
Implement application control or allowlisting to prevent the execution of unauthorized loaders and backdoors like RustSL, ValleyRAT, and ABCDoor.
Mapped D3FEND Techniques:
The phishing campaign targeting Indian entities began.
The phishing campaign expanded to target Russian organizations.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.