Chasing the Silver Fox: Cat & Mouse in Kernel Shadows
Check Point Research uncovered an ongoing campaign by the Silver Fox APT group exploiting a previously unknown vulnerable driver to evade endpoint protection. The attackers used a Microsoft-signed WatchDog Antimalware driver to terminate protected processes on fully updated Windows systems. A dual-driver strategy ensured compatibility across Windows versions. Following disclosure, the vendor released a patched driver, but attackers quickly adapted by modifying it to bypass blocklists while preserving its valid signature. The campaign delivered ValleyRAT as the final payload, demonstrating sophisticated evasion techniques and highlighting the growing trend of weaponizing signed-but-vulnerable drivers to bypass security measures.
AI Analysis
Technical Summary
The security threat described involves an advanced persistent threat (APT) group known as Silver Fox exploiting a previously unknown vulnerability in a Microsoft-signed WatchDog Antimalware driver to evade endpoint protection on fully updated Windows systems. The attackers leveraged a dual-driver strategy to maintain compatibility across different Windows versions, enabling them to terminate protected processes that are typically guarded by endpoint detection and response (EDR) solutions. This exploitation of a signed but vulnerable driver is a sophisticated evasion technique, as the driver’s valid Microsoft signature allows it to bypass many security controls that rely on signature verification. After the vulnerability was disclosed and the vendor released a patched driver, the attackers adapted by modifying the driver to bypass blocklists while preserving its valid signature, demonstrating their agility and persistence. The final payload delivered by this campaign is ValleyRAT, a remote access trojan (RAT) known for stealthy operations and data exfiltration capabilities. The campaign highlights a growing trend in weaponizing signed vulnerable drivers (Bring Your Own Vulnerable Driver - BYOVD) to bypass security measures, including kernel-level protections, process termination prevention, and EDR solutions. The attack techniques include kernel exploitation, signature manipulation, process termination, and persistence mechanisms, as indicated by the associated MITRE ATT&CK techniques (e.g., T1218.011, T1055, T1562.002). This threat is particularly dangerous because it operates at the kernel level, undermining the integrity and availability of endpoint protection, and enabling attackers to maintain stealthy access to compromised systems.
Potential Impact
For European organizations, this threat poses significant risks, especially for enterprises relying heavily on Windows-based infrastructure and endpoint protection solutions. The ability of Silver Fox to terminate protected processes and evade detection can lead to prolonged undetected intrusions, data theft, espionage, and disruption of critical services. Organizations in sectors such as finance, government, telecommunications, and critical infrastructure are particularly vulnerable due to the strategic value of their data and services. The use of a signed driver to bypass security controls complicates detection and response efforts, increasing the likelihood of successful compromise and lateral movement within networks. Additionally, the deployment of ValleyRAT as the final payload can facilitate remote control, data exfiltration, and further malware deployment, amplifying the potential damage. The campaign’s adaptability to patch releases and blocklists indicates a persistent threat that can continuously evolve, challenging traditional security postures. This can result in increased incident response costs, regulatory compliance risks (e.g., GDPR breaches), and reputational damage for affected European entities.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should implement a multi-layered approach beyond generic endpoint protection updates. First, deploy advanced driver control policies using Windows Defender Application Control (WDAC) or Device Guard to restrict the loading of unsigned or unapproved drivers, even if signed, by enforcing strict code integrity policies. Second, implement behavioral monitoring and anomaly detection at the kernel level to identify unusual process termination activities and driver manipulations indicative of BYOVD attacks. Third, maintain an up-to-date inventory of all drivers and monitor for unexpected changes or new driver installations. Fourth, leverage threat intelligence feeds and collaborate with vendors to quickly apply patches and blocklists, but also prepare for attacker adaptations by using heuristic and machine learning-based detection methods. Fifth, conduct regular threat hunting exercises focused on kernel-level anomalies and RAT indicators such as ValleyRAT. Finally, enforce least privilege principles and network segmentation to limit the lateral movement potential of compromised endpoints. Incident response plans should include procedures for kernel-level compromise scenarios and driver rollback capabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium
Indicators of Compromise
- hash: 2a299f33b84c85c28dcae950d3950034
- hash: 41885a879d63a3a519bbfc7f3a788f44
- hash: 47960eb7affa4987ebed6193b0a636b9
- hash: 8132275b7a38aaa2421e5815ba02bfd7
- hash: a83639773c1bd96a2953ea64a82ff863
- hash: ac2274dd71ab8191472ba14848d6f456
- hash: bca47e5e24491768604b5664ba5c760a
- hash: bfba4f65993c3695e03841e0f79f1d88
- hash: e62c339991d3af13407f0f4e69caabe2
- hash: 0e0464db821b1c3aee8d75f7fb28a3e0020cbdd7
- hash: 5001b8cd2cfb80c8ef43ecb89e45fe687d891e78
- hash: 9e2497dba8ac82b8774e5d2b4e4eaa038fa654ef
- hash: a4b2c0eb31bae06b9e4bbabc1984ad32575ad6c3
- hash: aa21ba6512611deae1b42b075b172c0940f6c017
- hash: b2ef2fa7c9a8b0973dea3313e5f2ac0179131233
- hash: b4501b3289e483bf683fcfe4574cd6308c09fd1f
- hash: e408a8e42967b8f28c55b3ef421963c8359acfe4
- hash: ea2c9067044da0a381365c9539821521cca06bcd
- hash: 09587073acbfec909eea69aa49774b3fdaa681db9cec7cb20a4143050897c393
- hash: 0be8483c2ea42f1ce4c90e84ac474a4e7017bc6d682e06f96dc1e31922a07b10
- hash: 12b3d8bc5cc1ea6e2acd741d8a80f56cf2a0a7ebfa0998e3f0743fcf83fabb9e
- hash: 2f0e34860194ccd232f7c8c27fefe44c96b63468e8581f93c38767725255f945
- hash: 35ccb9c521c301e416a3ea0c0292ae93914fe165eb45f749c16de03a99f5fa8e
- hash: 57f37bc0519557cf3f4c375fd04900a4d5afb82e3b723c6b9d0f96dc08eea84d
- hash: 5af1dae21425dda8311a2044209c308525135e1733eeff5dd20649946c6e054c
- hash: 5f23694d44850c1963b38d8eab638505d14c5605e9623fb98e9455795fa33321
- hash: 9c394dcab9f711e2bf585edf0d22d2210843885917d409ee56f22a4c24ad225e
- hash: 9e72b958b4ad9fdf64b6f12a89eb2bae80097a65dc8899732bce9dafda622148
- hash: b26aecc21da159c0073ecde31cc292d87c8674af8c312776d2cc9827e5c1ad6a
- hash: baccea051dc6bb1731fa2bc97c5e0cc2cd37463e83bf73a400451ad7ba00a543
- hash: d24fffc34e45c168ea4498f51a7d9f7f074d469c8d4317e8e2205c33a99b5364
- hash: fc97ad46767a45f4e59923f96d15ec5b680a33f580af7cc4e320fb9963933f26
- ip: 156.234.58.194
- ip: 156.241.144.66
Chasing the Silver Fox: Cat & Mouse in Kernel Shadows
Description
Check Point Research uncovered an ongoing campaign by the Silver Fox APT group exploiting a previously unknown vulnerable driver to evade endpoint protection. The attackers used a Microsoft-signed WatchDog Antimalware driver to terminate protected processes on fully updated Windows systems. A dual-driver strategy ensured compatibility across Windows versions. Following disclosure, the vendor released a patched driver, but attackers quickly adapted by modifying it to bypass blocklists while preserving its valid signature. The campaign delivered ValleyRAT as the final payload, demonstrating sophisticated evasion techniques and highlighting the growing trend of weaponizing signed-but-vulnerable drivers to bypass security measures.
AI-Powered Analysis
Technical Analysis
The security threat described involves an advanced persistent threat (APT) group known as Silver Fox exploiting a previously unknown vulnerability in a Microsoft-signed WatchDog Antimalware driver to evade endpoint protection on fully updated Windows systems. The attackers leveraged a dual-driver strategy to maintain compatibility across different Windows versions, enabling them to terminate protected processes that are typically guarded by endpoint detection and response (EDR) solutions. This exploitation of a signed but vulnerable driver is a sophisticated evasion technique, as the driver’s valid Microsoft signature allows it to bypass many security controls that rely on signature verification. After the vulnerability was disclosed and the vendor released a patched driver, the attackers adapted by modifying the driver to bypass blocklists while preserving its valid signature, demonstrating their agility and persistence. The final payload delivered by this campaign is ValleyRAT, a remote access trojan (RAT) known for stealthy operations and data exfiltration capabilities. The campaign highlights a growing trend in weaponizing signed vulnerable drivers (Bring Your Own Vulnerable Driver - BYOVD) to bypass security measures, including kernel-level protections, process termination prevention, and EDR solutions. The attack techniques include kernel exploitation, signature manipulation, process termination, and persistence mechanisms, as indicated by the associated MITRE ATT&CK techniques (e.g., T1218.011, T1055, T1562.002). This threat is particularly dangerous because it operates at the kernel level, undermining the integrity and availability of endpoint protection, and enabling attackers to maintain stealthy access to compromised systems.
Potential Impact
For European organizations, this threat poses significant risks, especially for enterprises relying heavily on Windows-based infrastructure and endpoint protection solutions. The ability of Silver Fox to terminate protected processes and evade detection can lead to prolonged undetected intrusions, data theft, espionage, and disruption of critical services. Organizations in sectors such as finance, government, telecommunications, and critical infrastructure are particularly vulnerable due to the strategic value of their data and services. The use of a signed driver to bypass security controls complicates detection and response efforts, increasing the likelihood of successful compromise and lateral movement within networks. Additionally, the deployment of ValleyRAT as the final payload can facilitate remote control, data exfiltration, and further malware deployment, amplifying the potential damage. The campaign’s adaptability to patch releases and blocklists indicates a persistent threat that can continuously evolve, challenging traditional security postures. This can result in increased incident response costs, regulatory compliance risks (e.g., GDPR breaches), and reputational damage for affected European entities.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should implement a multi-layered approach beyond generic endpoint protection updates. First, deploy advanced driver control policies using Windows Defender Application Control (WDAC) or Device Guard to restrict the loading of unsigned or unapproved drivers, even if signed, by enforcing strict code integrity policies. Second, implement behavioral monitoring and anomaly detection at the kernel level to identify unusual process termination activities and driver manipulations indicative of BYOVD attacks. Third, maintain an up-to-date inventory of all drivers and monitor for unexpected changes or new driver installations. Fourth, leverage threat intelligence feeds and collaborate with vendors to quickly apply patches and blocklists, but also prepare for attacker adaptations by using heuristic and machine learning-based detection methods. Fifth, conduct regular threat hunting exercises focused on kernel-level anomalies and RAT indicators such as ValleyRAT. Finally, enforce least privilege principles and network segmentation to limit the lateral movement potential of compromised endpoints. Incident response plans should include procedures for kernel-level compromise scenarios and driver rollback capabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://research.checkpoint.com/2025/silver-fox-apt-vulnerable-drivers/"]
- Adversary
- Silver Fox
- Pulse Id
- 68b059077886827c01bed027
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash2a299f33b84c85c28dcae950d3950034 | — | |
hash41885a879d63a3a519bbfc7f3a788f44 | — | |
hash47960eb7affa4987ebed6193b0a636b9 | — | |
hash8132275b7a38aaa2421e5815ba02bfd7 | — | |
hasha83639773c1bd96a2953ea64a82ff863 | — | |
hashac2274dd71ab8191472ba14848d6f456 | — | |
hashbca47e5e24491768604b5664ba5c760a | — | |
hashbfba4f65993c3695e03841e0f79f1d88 | — | |
hashe62c339991d3af13407f0f4e69caabe2 | — | |
hash0e0464db821b1c3aee8d75f7fb28a3e0020cbdd7 | — | |
hash5001b8cd2cfb80c8ef43ecb89e45fe687d891e78 | — | |
hash9e2497dba8ac82b8774e5d2b4e4eaa038fa654ef | — | |
hasha4b2c0eb31bae06b9e4bbabc1984ad32575ad6c3 | — | |
hashaa21ba6512611deae1b42b075b172c0940f6c017 | — | |
hashb2ef2fa7c9a8b0973dea3313e5f2ac0179131233 | — | |
hashb4501b3289e483bf683fcfe4574cd6308c09fd1f | — | |
hashe408a8e42967b8f28c55b3ef421963c8359acfe4 | — | |
hashea2c9067044da0a381365c9539821521cca06bcd | — | |
hash09587073acbfec909eea69aa49774b3fdaa681db9cec7cb20a4143050897c393 | — | |
hash0be8483c2ea42f1ce4c90e84ac474a4e7017bc6d682e06f96dc1e31922a07b10 | — | |
hash12b3d8bc5cc1ea6e2acd741d8a80f56cf2a0a7ebfa0998e3f0743fcf83fabb9e | — | |
hash2f0e34860194ccd232f7c8c27fefe44c96b63468e8581f93c38767725255f945 | — | |
hash35ccb9c521c301e416a3ea0c0292ae93914fe165eb45f749c16de03a99f5fa8e | — | |
hash57f37bc0519557cf3f4c375fd04900a4d5afb82e3b723c6b9d0f96dc08eea84d | — | |
hash5af1dae21425dda8311a2044209c308525135e1733eeff5dd20649946c6e054c | — | |
hash5f23694d44850c1963b38d8eab638505d14c5605e9623fb98e9455795fa33321 | — | |
hash9c394dcab9f711e2bf585edf0d22d2210843885917d409ee56f22a4c24ad225e | — | |
hash9e72b958b4ad9fdf64b6f12a89eb2bae80097a65dc8899732bce9dafda622148 | — | |
hashb26aecc21da159c0073ecde31cc292d87c8674af8c312776d2cc9827e5c1ad6a | — | |
hashbaccea051dc6bb1731fa2bc97c5e0cc2cd37463e83bf73a400451ad7ba00a543 | — | |
hashd24fffc34e45c168ea4498f51a7d9f7f074d469c8d4317e8e2205c33a99b5364 | — | |
hashfc97ad46767a45f4e59923f96d15ec5b680a33f580af7cc4e320fb9963933f26 | — |
Ip
Value | Description | Copy |
---|---|---|
ip156.234.58.194 | — | |
ip156.241.144.66 | — |
Threat ID: 68b05a98ad5a09ad006d1a54
Added to database: 8/28/2025, 1:33:12 PM
Last enriched: 8/28/2025, 1:49:24 PM
Last updated: 8/31/2025, 9:41:24 AM
Views: 25
Related Threats
ThreatFox IOCs for 2025-08-31
MediumThreatFox IOCs for 2025-08-30
MediumThreatFox IOCs for 2025-08-29
MediumOperation HanKook Phantom: Spear-Phishing Campaign
MediumThe First AI-Powered Ransomware & How It Works
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.