Silver Fox APT Expands Reach, Targets Japan and Malaysia with New RAT

Chinese APT Group "Silver Fox" Expands Operations to Japan and Malaysia, Deploying Winos 4.0 and HoldingHands RAT

HIGH
October 19, 2025
5m read
Threat ActorMalwareCyberattack

Related Entities

Threat Actors

Silver FoxSwimSnakeVoid Arachne

Organizations

Other

Winos 4.0ValleyRATHoldingHands RATGh0stBins

Full Report

Executive Summary

The aggressive Chinese cybercrime group known as Silver Fox (also tracked as SwimSnake and Void Arachne) has expanded its operational focus to include Japan and Malaysia. Previously concentrated on targets in China and Taiwan, the group is now using phishing campaigns to deploy a remote access trojan (RAT) called HoldingHands RAT (or Gh0stBins). This activity is part of a broader set of operations by the group, which also distributes the Winos 4.0 (ValleyRAT) malware. The group's diverse and evolving tactics, which include SEO poisoning and BYOVD attacks, signal a growing and sophisticated threat to organizations across the Asia-Pacific region.


Threat Overview

According to researchers at Fortinet's FortiGuard Labs, the latest campaign involves phishing emails containing PDF documents. These PDFs are designed as lures, such as a document masquerading as a Taiwanese tax regulation draft. The PDFs contain embedded links that, when clicked, lead the victim to a malicious webpage, for example, twsww[.]xin/download[.]html. This page, written in Japanese, prompts the user to download a ZIP archive containing the HoldingHands RAT.

This expansion follows a pattern of versatile and aggressive behavior from Silver Fox. The group is known for:

  • SEO Poisoning: Manipulating search results to direct users to fake download sites for popular software like Google Chrome and Telegram, which then deliver malware like Winos 4.0.
  • Bring Your Own Vulnerable Driver (BYOVD): In September 2025, Check Point research linked the group to an attack that abused a legitimate driver from WatchDog Anti-malware to disable security products on compromised systems.
  • Targeted Phishing: In a separate campaign dubbed "Operation Silk Lure," Seqrite Labs observed the group targeting HR departments in Chinese fintech and crypto firms with job-themed lures to deliver Winos 4.0.

Technical Analysis

Silver Fox employs a variety of TTPs to achieve its objectives, which appear to be a mix of cybercrime and espionage. The attack chain for the HoldingHands RAT campaign is a classic phishing-to-malware pipeline.

Attack Chain:

  1. Initial Access: A phishing email with a malicious PDF attachment is sent to the target.
  2. User Execution: The victim opens the PDF and clicks a malicious link.
  3. Drive-by Compromise: The link directs the user to a malicious webpage that hosts the malware.
  4. Execution: The user is tricked into downloading and executing a ZIP file, which deploys the HoldingHands RAT.
  5. Command and Control: The RAT establishes a connection to an actor-controlled server for remote access and data exfiltration.

MITRE ATT&CK Techniques:


Impact Assessment

The expansion of Silver Fox's operations poses a significant threat to organizations in Japan and Malaysia. The deployment of RATs like HoldingHands and Winos 4.0 can lead to the complete compromise of infected systems, resulting in the theft of sensitive corporate data, intellectual property, and financial information. The group's targeting of government-related themes (Ministry of Finance) suggests a potential cyber espionage motive in addition to financial crime. Their proven ability to disable security software makes them a particularly dangerous and persistent adversary.


IOCs

Type Value Description
url twsww[.]xin/download[.]html Malicious webpage used to distribute the HoldingHands RAT.

Detection & Response

  1. Email and Web Filtering: Block emails containing suspicious PDF attachments and deny access to known malicious domains and URLs like the one identified.
  2. Endpoint Monitoring: Use EDR solutions to monitor for the execution of unsigned binaries and scripts, especially those originating from downloaded ZIP files. Look for behaviors associated with RATs, such as registry modifications for persistence, process injection, and unusual network connections.
  3. Driver Monitoring: Monitor for the loading of unusual or known-vulnerable drivers. Enabling Windows Defender's vulnerable driver blocklist can help mitigate BYOVD attacks.

D3FEND Techniques for Detection:


Mitigation

  1. User Awareness Training: Train employees to be suspicious of unsolicited emails, especially those with attachments or links, even if they appear to be from official sources.
  2. Restrict Web Content: Use web proxies to block access to uncategorized or newly registered domains, which are often used in phishing campaigns.
  3. Application Hardening: Configure PDF readers to disable the automatic execution of links or scripts.
  4. Endpoint Security: Ensure endpoint security solutions are kept up-to-date and that tamper protection features are enabled to prevent attackers from disabling them.

D3FEND Countermeasures:

Timeline of Events

1
September 1, 2025
Check Point research links Silver Fox to a BYOVD attack.
2
October 19, 2025
This article was published

MITRE ATT&CK Mitigations

Training users to be skeptical of unsolicited emails and attachments is the primary defense against the phishing vectors used by Silver Fox.

Using a web filter to block access to malicious sites and uncategorized domains prevents users from reaching the malware download page.

Mapped D3FEND Techniques:

Endpoint protection solutions can detect and block the execution of known RATs like Winos 4.0 and HoldingHands RAT.

Mapped D3FEND Techniques:

Implementing policies to block the loading of known vulnerable drivers is a key defense against the BYOVD technique.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Given Silver Fox's demonstrated use of Bring Your Own Vulnerable Driver (BYOVD) attacks to disable security software, implementing Driver Load Integrity Checking is a crucial countermeasure. Organizations should leverage features like the Microsoft vulnerable driver blocklist, which is integrated into Windows Defender Application Control (WDAC). This feature prevents the loading of drivers known to be abusable. Security teams should ensure this blocklist is enabled and kept up-to-date. This directly counters the TTP of abusing the WatchDog Anti-malware driver, preventing the threat actor from gaining kernel-level privileges and disabling endpoint defenses, thereby preserving the integrity of the security stack.

To combat the phishing vector used to deliver HoldingHands RAT, organizations should employ advanced URL analysis at their web gateway or proxy. This involves more than just static denylisting. The solution should analyze URLs in real-time, especially those from inbound emails, for suspicious characteristics. For this specific campaign, it would flag the link to twsww[.]xin/download[.]html based on several factors: the uncommon .xin TLD, the presence of a 'download' keyword which is common in malicious URLs, and low domain reputation. By analyzing and blocking such URLs before a user can access them, the attack chain is broken, preventing the download of the malicious ZIP archive and subsequent RAT infection.

Sources & References

Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT
The Hacker News (thehackernews.com) October 18, 2025
WIU Cybersecurity Center - Western Illinois University
WIU Cybersecurity Center (wiu.edu) October 18, 2025
Winos 4.0 hackers expand to Japan and Malaysia with new malware
Security Affairs (securityaffairs.com) October 18, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Silver FoxAPTWinos 4.0HoldingHands RATcyber espionageBYOVDphishing

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading