Cybersecurity

How the Silver Fox Group Deploys the ABCDoor Backdoor via Phishing Campaigns

2026-05-03 01:35:49

Introduction

In late 2025 and early 2026, the Silver Fox threat group orchestrated a sophisticated phishing campaign targeting organizations in Russia and India. By impersonating tax authorities and exploiting a publicly available Rust-based loader, they deployed the well-known ValleyRAT backdoor alongside a previously undocumented Python-based backdoor named ABCDoor. This guide breaks down each step of their attack chain, from initial email setup to final payload execution, providing a clear understanding of their methods.

How the Silver Fox Group Deploys the ABCDoor Backdoor via Phishing Campaigns
Source: securelist.com

What You Need

Step-by-Step Attack Process

Step 1: Craft a Tax-Themed Phishing Email

Silver Fox designed emails that appear to be official notices from tax authorities. For the India campaign (December 2025), the email claimed to be from the Indian Income Tax Department and included an archive attachment. For the Russia campaign (January 2026), the email purported to be from the Russian Federal Tax Service and contained a PDF with download links. Both messages exploit the urgency and authority associated with tax matters to trick recipients into opening the attachment or clicking the links.

Step 2: Attach or Embed Malicious Content

Two delivery methods were used:

Step 3: Host the Malicious Archive on a Remote Server

The attackers used the domain haijing88[.]com to host the archives. For the India campaign, they also used a subdirectory named 印度邮箱 (Chinese for “Indian mailbox”) to store a similar archive (CBDT.rar). The archive contains the RustSL loader and any additional payloads.

Step 4: Deliver the RustSL Loader

When the victim opens the archive and runs the malicious file (e.g., Click File.exe or the extracted фнс.exe), the RustSL loader executes. This loader is a modified version of a publicly available Rust-based loader from GitHub. The modification ensures it connects to a command-and-control (C2) server to download the next stage.

How the Silver Fox Group Deploys the ABCDoor Backdoor via Phishing Campaigns
Source: securelist.com

Step 5: Download and Execute ValleyRAT

The RustSL loader contacts its C2 server and downloads the ValleyRAT backdoor. ValleyRAT is a known malware that provides remote access, keylogging, and screen capture capabilities. Once executed, it establishes persistence and opens a backdoor to the attacker.

Step 6: Deploy the ABCDoor Plugin

During this campaign, the attackers delivered a new ValleyRAT plugin that acts as a loader for a previously undocumented Python-based backdoor named ABCDoor. This plugin downloads and runs ABCDoor from the same or a secondary C2 server. ABCDoor is a lightweight backdoor written in Python, allowing the attackers to maintain long-term access and execute arbitrary commands.

Step 7: Maintain Persistence and Exfiltrate Data

Once ABCDoor is active, it can be used for data theft, lateral movement, or deploying additional payloads. The attackers have used ABCDoor since at least late 2024, refining it for real-world attacks through early 2026.

Tips for Defenders

By understanding these steps, organizations can better prepare for and defend against similar campaigns targeting tax authorities and critical infrastructure.

Explore

6 Ways GeForce NOW Just Made Cloud Gaming Smarter and More Fun ACEMAGIC F5A Mini PC: Ryzen AI HX 470 Upgrade Explained New Interactive Maps Unlock the Secrets of Neverness to Everness Behind the Scenes: Documenting the Open-Source Heroes of the Internet A Fleet Operator’s Guide to Tesla Semi Charging Infrastructure: Basecharger and Megacharger