Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

A cunning predator: How Silver Fox preys on Japanese firms this tax season

0
Medium
Published: Sat Mar 28 2026 (03/28/2026, 16:12:50 UTC)
Source: AlienVault OTX General

Description

Silver Fox, a threat actor, is exploiting Japan's tax filing and organizational change season with a targeted spearphishing campaign against Japanese businesses. The group sends convincing phishing emails related to tax compliance, salary adjustments, and HR matters, tricking recipients into opening malicious links or attachments. The campaign capitalizes on the high volume of legitimate financial and HR communications during this period, increasing the risk of compromise. Silver Fox has expanded its targets from Chinese-speaking entities to Southeast Asia, Japan, and potentially North America. The group uses ValleyRAT, a remote access trojan, to gain control of compromised machines and steal sensitive information. To protect against this threat, organizations should increase vigilance, reinforce awareness about phishing attempts, and verify the authenticity of tax- and HR-themed requests.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 10:23:36 UTC

Technical Analysis

Silver Fox is a sophisticated threat actor that has adapted its targeting strategy to exploit the seasonal tax filing and organizational change period in Japan. This timing is critical because businesses receive a high volume of legitimate communications related to tax compliance, salary adjustments, and human resources, which Silver Fox mimics in spearphishing emails. These emails contain malicious links or attachments designed to deploy ValleyRAT, a remote access trojan (RAT) capable of providing attackers with persistent control over infected machines. ValleyRAT enables the attacker to steal sensitive information, potentially including financial data, employee records, and intellectual property. The campaign is notable for its tailored social engineering tactics, leveraging themes that are contextually relevant and urgent to the recipients, thereby increasing the likelihood of successful compromise. Silver Fox has expanded its operational scope from Chinese-speaking targets to include Southeast Asia, Japan, and possibly North America, indicating a growing ambition and capability. The attack techniques align with MITRE ATT&CK tactics such as spearphishing (T1566), use of remote access tools (T1219), and command and control communications (T1071). Although no known exploits in the wild have been reported, the campaign’s targeted nature and use of a RAT pose significant risks to affected organizations. The threat actor is linked to the adversary group Void Arachne, known for targeted espionage and data theft. Defenders should focus on detecting ValleyRAT activity, enhancing user awareness during tax season, and validating all tax- and HR-related communications through independent channels.

Potential Impact

The primary impact of the Silver Fox campaign is the compromise of sensitive business information through successful spearphishing attacks. Organizations affected may suffer data breaches involving financial records, employee personal information, and confidential corporate data. The deployment of ValleyRAT allows attackers persistent access, enabling long-term espionage, data exfiltration, and potential lateral movement within networks. This can lead to financial losses, reputational damage, regulatory penalties, and disruption of business operations. Given the campaign’s focus on tax and HR themes, compromised data could also facilitate fraud, identity theft, or manipulation of payroll systems. The expansion of targeting beyond Japan to Southeast Asia and North America suggests a broader risk to multinational corporations with operations or partners in these regions. The timing during tax season increases the likelihood of successful phishing due to the volume and urgency of legitimate communications, making detection more challenging. While the threat is currently medium severity, failure to mitigate could escalate the impact to critical levels if attackers leverage access for ransomware deployment or supply chain attacks.

Mitigation Recommendations

Organizations should implement multi-layered defenses tailored to the specific tactics used by Silver Fox. First, enhance email security by deploying advanced phishing detection tools that analyze message context, sender reputation, and attachment behavior. Implement domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM to reduce email spoofing. Conduct targeted user awareness training focused on recognizing tax- and HR-themed phishing lures, emphasizing verification of unexpected or unusual requests through independent channels such as direct phone calls or official portals. Deploy endpoint detection and response (EDR) solutions capable of identifying ValleyRAT signatures and anomalous remote access behaviors. Network segmentation and strict access controls can limit lateral movement if a machine is compromised. Regularly update and patch systems to reduce vulnerabilities that could be exploited post-infection. Monitor network traffic for suspicious command and control communications associated with ValleyRAT. Establish incident response plans that include rapid containment and forensic analysis to minimize damage. Collaborate with tax and HR departments to establish secure communication protocols during sensitive periods. Finally, share threat intelligence with industry peers and national cybersecurity centers to stay informed of evolving tactics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.welivesecurity.com/en/business-security/cunning-predator-how-silver-fox-preys-japanese-firms-tax-season/"]
Adversary
Void Arachne
Pulse Id
69c7fe028b39a27c589226aa
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip149.104.24.24
ip103.210.238.29
ip103.236.63.138
ip154.36.152.151
ip206.206.77.224

Hash

ValueDescriptionCopy
hash12a0d942652609bce7319be6bf0135bb
hash1af5b25acd2df31f44a54fc8dcd85287
hash21d9a30074d65babfef9e9e9684c6f5a
hash4f481a449ad050fea9ca3900118e5676
hash5d29469672159fdb5d4aa4e02d36f60b
hash6533bcf04eb69e5119ceec156c41897f
hash7a1c4ccea43f902d9c9f4a24f3524567
hashdfb07265ffe8a82a3d912c3a3fee5382
hashe65c67def0ae80c05200965934455a05
hash092d8e457cb9c54a757dad082740a45db67812ed
hash0a99da9359d4cc823f72853b7d9c974bd196305c
hash10adbfaccff4ada35f37cf88a7f869b88429b93f
hash11a1e60fc3d57ea652903239d46d245a512d2e53
hash160f9241ff8183a18b0f1453622c9432b087bf41
hash1eb13ad1f827e6ef72eb8a0023ef131c26f12e3e
hash2328e572532f382e237e7a1b74cb0531308f5704
hash25510d914499b6a746c0317c7081e3c0bf564aa6
hash2fa212ee231819a2343b60966cf53e1a8f8df927
hash3d1f8fef94c1b1ffa7829e030eba3bcfca737110
hash469e41dde5a31bc91af8aa5db807f9f29f85510d
hash4e6755a713bc7192f075312c1c499ac4ee9d70c2
hash51a0832fc378d08566427bf0510e1d7f922a8ae3
hash55358216844a60a5a0e895e858e3d75b8501fbb7
hash56cf8418fb7b599fe4df5e4b879ecb813132109a
hash589a931024960b253a34e3fca58c89368822d8fc
hash5bd82a88950e029312bcf55b1bb6528fe96a3046
hash62b5a6c1a45868b2454544888aef9ce18b4367d7
hash6b00123ad0510bb5df667a05b518a3573ac90546
hash6f93afebb90913e4410fd24580bae44a9ef852cc
hash7974bad0b55d681bd269d0367d38f3a49f99aacd
hash7b1bf4df1c8fc077d381fdb30962dfdeb6ccbaa5
hash7b772c2c24c5afda17d3aab2cb8c50f9099e0d65
hash80c5d1ae1ee86f607fdefbbc5f88c5539f8582b5
hash8a5907b4b4ab7b39aa3390249abcaa14e1618139
hash8aaac65ccfb4670650c090fdc8d140713fa45bf9
hash8abe494fd4143e77e1745b2576fc75d0d5ffe05c
hash8e32b303226f6016726315be2b7dda39aadd984e
hash8e65b41dc6b1c03ce3f9c9dd6c3f2dc44af53a43
hash93ffb9a59a3658dad9febc1221922832a5edf5b4
hasha0233e66704b087c356dc5f30bd292ce4839be1a
hasha3973e372f847d3ded1c877ad097c036c4cf43b2
hasha4636d1c7d68b844748e68166f1985d2b594b4f3
hasha74c078f662a78cd11d38c032689a0f5e9e53962
hashb1b9a016b3fda14e3537dd73d15dcff83b168895
hashc176ea706e8f0d5cc22b226634d3853e2509279b
hashc8a3223bb0991c81d774a94316bccc64fb25b2a8
hashc9559deb931b5ac9e1c491dd464ef331001a0851
hashcbc31f3fbbadcd49122f1beac28f648f7d98cc50
hashd5e18be55d01e3c7b301bcdefe44dade963bad44
hashd9cd907d51cfd082796eb636abe2e43f32bd0247
hashdae74b42e4a6f123f0c2329f772c70af8dec2d71
hashe5c8f43fb31d1d627b42273d03ec15723f80733a
hashf46d3dab258eddfcb1a10d531d8ab7992357b2cd
hashf95cd0d3244a09b61d39a827505ef061a9f04a38
hashfc5d4b1fb2bbc690016ff51567162865f3a0485b
hashff848dacc5062ed4c2eb51614c47a5d851dab6a0
hash244a2f4dc256f6d1c3710a2d27656a6bc21ffadca8f3236d63b327ff2f0b33db
hash516dd5f495d697b199a9e7cc71f686c992b65d14b57c55d91068c0909bcc7b00
hash55b99f0d438800cad8288d81d2808728ce1bec8c22c5346a38a513dc6728b4ba
hash677e42b1d3d7bfc87e5dddd1c7aad2c7142afb26e7ac0ace53f2996c3005ff90
hash8c4386cecc89f5f2dee323f2a1e0d9f42a28905be812de14173ca7ee9fc64e72
hash9d7f8e321082b46dcf625d7b24dcb9c72710e87a1a66cccd265cdbe926e78813
hasha23640778b836420eecb5461938a98ad3588d2044359daf6b4b25ecaf35c996e
hashb1398d15d45d439a2abd5f7341b870de0818df357ebc78e7410465b74409dfa5
hashca11ac11dc9dd8d2c6b95bc422a4c2f3d986f8dd5e508fb8d6e2b8aa7b4d5a31

Domain

ValueDescriptionCopy
domainescaperoomhub.com
domaingovbr.icu
domaingovbrk.shop
domaingovernment1.icu
domainincometax.biz.id
domainlolpartyanimals.com
domainsjxcrojzkn.com
domaintyjmbeexa.cn
domainywdtwss.icu

Threat ID: 69ca4b8fe6bfc5ba1d0d7d14

Added to database: 3/30/2026, 10:08:15 AM

Last enriched: 3/30/2026, 10:23:36 AM

Last updated: 3/31/2026, 5:00:59 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses