Skip to main content

Chasing the Silver Fox: Cat & Mouse in Kernel Shadows

Medium
Published: Thu Aug 28 2025 (08/28/2025, 13:26:31 UTC)
Source: AlienVault OTX General

Description

Check Point Research uncovered an ongoing campaign by the Silver Fox APT group exploiting a previously unknown vulnerable driver to evade endpoint protection. The attackers used a Microsoft-signed WatchDog Antimalware driver to terminate protected processes on fully updated Windows systems. A dual-driver strategy ensured compatibility across Windows versions. Following disclosure, the vendor released a patched driver, but attackers quickly adapted by modifying it to bypass blocklists while preserving its valid signature. The campaign delivered ValleyRAT as the final payload, demonstrating sophisticated evasion techniques and highlighting the growing trend of weaponizing signed-but-vulnerable drivers to bypass security measures.

AI-Powered Analysis

AILast updated: 08/28/2025, 13:49:24 UTC

Technical Analysis

The security threat described involves an advanced persistent threat (APT) group known as Silver Fox exploiting a previously unknown vulnerability in a Microsoft-signed WatchDog Antimalware driver to evade endpoint protection on fully updated Windows systems. The attackers leveraged a dual-driver strategy to maintain compatibility across different Windows versions, enabling them to terminate protected processes that are typically guarded by endpoint detection and response (EDR) solutions. This exploitation of a signed but vulnerable driver is a sophisticated evasion technique, as the driver’s valid Microsoft signature allows it to bypass many security controls that rely on signature verification. After the vulnerability was disclosed and the vendor released a patched driver, the attackers adapted by modifying the driver to bypass blocklists while preserving its valid signature, demonstrating their agility and persistence. The final payload delivered by this campaign is ValleyRAT, a remote access trojan (RAT) known for stealthy operations and data exfiltration capabilities. The campaign highlights a growing trend in weaponizing signed vulnerable drivers (Bring Your Own Vulnerable Driver - BYOVD) to bypass security measures, including kernel-level protections, process termination prevention, and EDR solutions. The attack techniques include kernel exploitation, signature manipulation, process termination, and persistence mechanisms, as indicated by the associated MITRE ATT&CK techniques (e.g., T1218.011, T1055, T1562.002). This threat is particularly dangerous because it operates at the kernel level, undermining the integrity and availability of endpoint protection, and enabling attackers to maintain stealthy access to compromised systems.

Potential Impact

For European organizations, this threat poses significant risks, especially for enterprises relying heavily on Windows-based infrastructure and endpoint protection solutions. The ability of Silver Fox to terminate protected processes and evade detection can lead to prolonged undetected intrusions, data theft, espionage, and disruption of critical services. Organizations in sectors such as finance, government, telecommunications, and critical infrastructure are particularly vulnerable due to the strategic value of their data and services. The use of a signed driver to bypass security controls complicates detection and response efforts, increasing the likelihood of successful compromise and lateral movement within networks. Additionally, the deployment of ValleyRAT as the final payload can facilitate remote control, data exfiltration, and further malware deployment, amplifying the potential damage. The campaign’s adaptability to patch releases and blocklists indicates a persistent threat that can continuously evolve, challenging traditional security postures. This can result in increased incident response costs, regulatory compliance risks (e.g., GDPR breaches), and reputational damage for affected European entities.

Mitigation Recommendations

To mitigate this threat effectively, European organizations should implement a multi-layered approach beyond generic endpoint protection updates. First, deploy advanced driver control policies using Windows Defender Application Control (WDAC) or Device Guard to restrict the loading of unsigned or unapproved drivers, even if signed, by enforcing strict code integrity policies. Second, implement behavioral monitoring and anomaly detection at the kernel level to identify unusual process termination activities and driver manipulations indicative of BYOVD attacks. Third, maintain an up-to-date inventory of all drivers and monitor for unexpected changes or new driver installations. Fourth, leverage threat intelligence feeds and collaborate with vendors to quickly apply patches and blocklists, but also prepare for attacker adaptations by using heuristic and machine learning-based detection methods. Fifth, conduct regular threat hunting exercises focused on kernel-level anomalies and RAT indicators such as ValleyRAT. Finally, enforce least privilege principles and network segmentation to limit the lateral movement potential of compromised endpoints. Incident response plans should include procedures for kernel-level compromise scenarios and driver rollback capabilities.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://research.checkpoint.com/2025/silver-fox-apt-vulnerable-drivers/"]
Adversary
Silver Fox
Pulse Id
68b059077886827c01bed027
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash2a299f33b84c85c28dcae950d3950034
hash41885a879d63a3a519bbfc7f3a788f44
hash47960eb7affa4987ebed6193b0a636b9
hash8132275b7a38aaa2421e5815ba02bfd7
hasha83639773c1bd96a2953ea64a82ff863
hashac2274dd71ab8191472ba14848d6f456
hashbca47e5e24491768604b5664ba5c760a
hashbfba4f65993c3695e03841e0f79f1d88
hashe62c339991d3af13407f0f4e69caabe2
hash0e0464db821b1c3aee8d75f7fb28a3e0020cbdd7
hash5001b8cd2cfb80c8ef43ecb89e45fe687d891e78
hash9e2497dba8ac82b8774e5d2b4e4eaa038fa654ef
hasha4b2c0eb31bae06b9e4bbabc1984ad32575ad6c3
hashaa21ba6512611deae1b42b075b172c0940f6c017
hashb2ef2fa7c9a8b0973dea3313e5f2ac0179131233
hashb4501b3289e483bf683fcfe4574cd6308c09fd1f
hashe408a8e42967b8f28c55b3ef421963c8359acfe4
hashea2c9067044da0a381365c9539821521cca06bcd
hash09587073acbfec909eea69aa49774b3fdaa681db9cec7cb20a4143050897c393
hash0be8483c2ea42f1ce4c90e84ac474a4e7017bc6d682e06f96dc1e31922a07b10
hash12b3d8bc5cc1ea6e2acd741d8a80f56cf2a0a7ebfa0998e3f0743fcf83fabb9e
hash2f0e34860194ccd232f7c8c27fefe44c96b63468e8581f93c38767725255f945
hash35ccb9c521c301e416a3ea0c0292ae93914fe165eb45f749c16de03a99f5fa8e
hash57f37bc0519557cf3f4c375fd04900a4d5afb82e3b723c6b9d0f96dc08eea84d
hash5af1dae21425dda8311a2044209c308525135e1733eeff5dd20649946c6e054c
hash5f23694d44850c1963b38d8eab638505d14c5605e9623fb98e9455795fa33321
hash9c394dcab9f711e2bf585edf0d22d2210843885917d409ee56f22a4c24ad225e
hash9e72b958b4ad9fdf64b6f12a89eb2bae80097a65dc8899732bce9dafda622148
hashb26aecc21da159c0073ecde31cc292d87c8674af8c312776d2cc9827e5c1ad6a
hashbaccea051dc6bb1731fa2bc97c5e0cc2cd37463e83bf73a400451ad7ba00a543
hashd24fffc34e45c168ea4498f51a7d9f7f074d469c8d4317e8e2205c33a99b5364
hashfc97ad46767a45f4e59923f96d15ec5b680a33f580af7cc4e320fb9963933f26

Ip

ValueDescriptionCopy
ip156.234.58.194
ip156.241.144.66

Threat ID: 68b05a98ad5a09ad006d1a54

Added to database: 8/28/2025, 1:33:12 PM

Last enriched: 8/28/2025, 1:49:24 PM

Last updated: 8/31/2025, 9:41:24 AM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats