Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Russian Ruse: ValleyRAT Hits China via Fake Microsoft Teams Attack

0
Medium
Published: Wed Dec 10 2025 (12/10/2025, 17:22:42 UTC)
Source: AlienVault OTX General

Description

The Chinese APT group Silver Fox has launched an SEO poisoning campaign targeting Chinese-speaking users, impersonating Microsoft Teams. The campaign uses a modified ValleyRAT loader with Cyrillic elements to mislead attribution. Silver Fox aims to conduct espionage and financial fraud, posing a significant threat due to its dual mission. The attack chain involves a fake Teams website, malicious ZIP files, and binary data retrieval from XML and JSON files. The malware exploits rundll32.exe for binary proxy execution and establishes C2 communication. Attribution to Silver Fox is based on overlapping infrastructure and links to previous campaigns. Organizations with global operations, especially in China, are advised to implement robust security measures and logging capabilities to defend against this evolving threat.

AI-Powered Analysis

AILast updated: 12/11/2025, 09:24:41 UTC

Technical Analysis

This threat involves the Chinese APT group Silver Fox launching an SEO poisoning campaign that impersonates Microsoft Teams to lure Chinese-speaking victims into downloading malicious payloads. The attackers created a fake Microsoft Teams website that appears legitimate in search results, tricking users into downloading ZIP archives containing malicious binaries. The malware payload is a modified version of ValleyRAT, a remote access trojan, which includes Cyrillic elements to mislead attribution efforts and suggest a Russian origin. The attack chain includes retrieving binary data embedded within XML and JSON files, which are then executed via the Windows utility rundll32.exe, a technique known as binary proxy execution (T1218.011). This method helps evade detection by running malicious code under a trusted system process. Once executed, the malware establishes command-and-control (C2) communication channels to receive instructions and exfiltrate data. The dual objectives of espionage and financial fraud increase the threat's complexity and potential impact. Attribution to Silver Fox is supported by overlapping infrastructure and links to previous campaigns. The campaign leverages multiple tactics, techniques, and procedures (TTPs) including SEO poisoning, social engineering, obfuscation, and living-off-the-land binaries, making detection and mitigation challenging. Although no known exploits are currently widespread in the wild, the threat is evolving and poses a significant risk to organizations with exposure to Chinese-speaking users or operations in China.

Potential Impact

For European organizations, the primary impact arises if they have business operations, partnerships, or personnel in China or Chinese-speaking regions, as these entities may be targeted via this campaign. The espionage component threatens confidentiality by potentially exposing sensitive corporate or governmental information. Financial fraud risks could lead to monetary losses and reputational damage. The use of trusted system utilities like rundll32.exe complicates detection, increasing the likelihood of prolonged undetected presence and data exfiltration. Additionally, the false flag elements may misdirect incident response efforts, delaying remediation. Organizations with global supply chains or remote employees using Microsoft Teams could be indirectly affected if users access compromised resources. The medium severity reflects the moderate ease of exploitation via social engineering combined with the significant potential for data theft and fraud. Overall, the threat could disrupt business operations, compromise intellectual property, and undermine trust in communication platforms.

Mitigation Recommendations

European organizations should implement targeted mitigations beyond generic advice: 1) Enhance DNS and web filtering to detect and block access to known malicious domains and SEO-poisoned sites impersonating Microsoft Teams. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying living-off-the-land techniques such as rundll32.exe misuse and anomalous binary executions from XML/JSON sources. 3) Conduct focused user awareness training emphasizing the risks of downloading software from unofficial websites and recognizing phishing attempts involving collaboration tools. 4) Implement strict application whitelisting policies to prevent unauthorized execution of binaries from non-standard locations or compressed archives. 5) Monitor network traffic for unusual C2 communications, especially those involving encrypted or uncommon protocols. 6) Maintain comprehensive logging and correlate events across endpoints and network devices to detect stealthy intrusions. 7) Regularly audit and update threat intelligence feeds to include emerging Silver Fox indicators and tactics. 8) For organizations with China-facing operations, consider segmenting networks and applying stricter access controls to limit lateral movement. These measures combined will reduce the attack surface and improve early detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://reliaquest.com/blog/threat-spotlight-silver-foxs-russian-ruse-fake-microsoft-teams-attack"]
Adversary
Silver Fox
Pulse Id
6939ac62e469d4f7f250be99
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip27.124.43.7
ip134.122.128.131
ip134.122.128.141
ip134.122.128.143
ip134.122.207.17
ip134.122.207.20
ip134.122.207.22
ip137.220.135.74
ip137.220.135.79
ip137.220.135.86
ip143.92.63.147
ip143.92.63.167
ip143.92.63.190
ip27.124.43.12
ip27.124.43.4
ip43.226.125.112
ip43.226.125.124
ip43.226.125.125

Hash

ValueDescriptionCopy
hashd73593469375120d2bdb403383777f2737bc2018

Url

ValueDescriptionCopy
urlhttp://6esygx.space
urlhttp://binancegames.sb
urlhttp://qzjfxy.fun
urlhttp://teams.baoyingkeji.com
urlhttp://teams.chetanagarbatti.com
urlhttp://teams.cpeakem.com
urlhttp://teams.fin-tastikantioch.com
urlhttp://teams.fjzwb.com
urlhttp://teams.hardepc.com
urlhttp://teams.jqsnzp.com
urlhttp://teams.kensun4a.com
urlhttp://teams.kkkgenieyesl.cn
urlhttp://teams.plsgongmu.com
urlhttp://teams.telegramgwxz.com
urlhttp://teams.telegramtgxz.com
urlhttp://teams.telegramzwxz.com
urlhttp://teams.xclyd.com
urlhttp://teamscn.com
urlhttp://teamszv.com

Domain

ValueDescriptionCopy
domain6esygx.space
domainbinancegames.sb
domainqzjfxy.fun
domainteamscn.com
domainteamszv.com
domainteams.baoyingkeji.com
domainteams.chetanagarbatti.com
domainteams.cpeakem.com
domainteams.fin-tastikantioch.com
domainteams.fjzwb.com
domainteams.hardepc.com
domainteams.jqsnzp.com
domainteams.kensun4a.com
domainteams.kkkgenieyesl.cn
domainteams.plsgongmu.com
domainteams.telegramgwxz.com
domainteams.telegramtgxz.com
domainteams.telegramzwxz.com
domainteams.xclyd.com

Threat ID: 693a8a287d4c6f31f792edc2

Added to database: 12/11/2025, 9:08:56 AM

Last enriched: 12/11/2025, 9:24:41 AM

Last updated: 2/7/2026, 5:27:39 AM

Views: 166

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats