Chasing the Silver Fox: Cat & Mouse in Kernel Shadows
Aug. 28, 2025, 1:45 p.m.
Description
Check Point Research uncovered an ongoing campaign by the Silver Fox APT group exploiting a previously unknown vulnerable driver to evade endpoint protection. The attackers used a Microsoft-signed WatchDog Antimalware driver to terminate protected processes on fully updated Windows systems. A dual-driver strategy ensured compatibility across Windows versions. Following disclosure, the vendor released a patched driver, but attackers quickly adapted by modifying it to bypass blocklists while preserving its valid signature. The campaign delivered ValleyRAT as the final payload, demonstrating sophisticated evasion techniques and highlighting the growing trend of weaponizing signed-but-vulnerable drivers to bypass security measures.
Tags
Date
- Created: Aug. 28, 2025, 1:26 p.m.
- Published: Aug. 28, 2025, 1:26 p.m.
- Modified: Aug. 28, 2025, 1:45 p.m.
Indicators
- fc97ad46767a45f4e59923f96d15ec5b680a33f580af7cc4e320fb9963933f26
- d24fffc34e45c168ea4498f51a7d9f7f074d469c8d4317e8e2205c33a99b5364
- baccea051dc6bb1731fa2bc97c5e0cc2cd37463e83bf73a400451ad7ba00a543
- b26aecc21da159c0073ecde31cc292d87c8674af8c312776d2cc9827e5c1ad6a
- 9e72b958b4ad9fdf64b6f12a89eb2bae80097a65dc8899732bce9dafda622148
- 9c394dcab9f711e2bf585edf0d22d2210843885917d409ee56f22a4c24ad225e
- 5f23694d44850c1963b38d8eab638505d14c5605e9623fb98e9455795fa33321
- 5af1dae21425dda8311a2044209c308525135e1733eeff5dd20649946c6e054c
- 57f37bc0519557cf3f4c375fd04900a4d5afb82e3b723c6b9d0f96dc08eea84d
- 35ccb9c521c301e416a3ea0c0292ae93914fe165eb45f749c16de03a99f5fa8e
- 2f0e34860194ccd232f7c8c27fefe44c96b63468e8581f93c38767725255f945
- 0be8483c2ea42f1ce4c90e84ac474a4e7017bc6d682e06f96dc1e31922a07b10
- 12b3d8bc5cc1ea6e2acd741d8a80f56cf2a0a7ebfa0998e3f0743fcf83fabb9e
- 09587073acbfec909eea69aa49774b3fdaa681db9cec7cb20a4143050897c393
- 156.241.144.66
- 156.234.58.194
Additional Informations
- China