We bring you the latest news and alerts detected from Cybersecurity
Vulnerabilities
Cybercriminals Actively Exploit Critical Sudo Vulnerability to Gain Root Access (CVE-2025-324639)
Critical DLL Hijacking Flaw Discovered in Notepad++ Code Editor (CVE-2025-56383)
Malware
Phishing Campaign Targeting the U.S. Uses AI-Generated SVG Files to Evade Email Security
New Malware ‘Raven Stealer’ Targets Chromium-Based Browsers to Steal Credentials and Data
Cybersecurity
Moldova Government Websites Hit by 14 Million DDoS Attempts on Election Day
Japan’s Largest Brewer Asahi Group Hit by Cyberattack Disrupting Production
Latest threats detected
Silver Fox Exploits Microsoft-Signed Driver to Distribute ValleyRAT
30/09/2025
Executive Summary
Silver Fox exploits a vulnerable Microsoft-signed driver to disable antivirus software and deploy the ValleyRAT backdoor.
Data
Type:
TLP:
Objectives
Targets:
Affected assets:
Attack vector:
Malware
White
Zemana y WatchDog Controlers
Multiple
Multiple
ValleyRAT, malware, Microsoft, SilverFox
Description
Silver Fox is running a campaign that uses the Bring Your Own Vulnerable Driver (BYOVD) technique—leveraging legitimate but vulnerable drivers to bypass security protections—by abusing a Microsoft-signed driver, amsdk.sys (version 1.0.600), to distribute the ValleyRAT trojan. Because the driver is legitimate, Microsoft’s driver blocklist does not flag it; consequently, this module could be loaded without being intercepted by security solutions, enabling the disabling of antivirus and other system defenses.
Technical Details
Threat actors are using legitimate vulnerable drivers that contain multiple flaws allowing arbitrary process termination without checking whether processes are running with protection (PP/PPL) or verifying local privilege escalation, which lets them gain unrestricted access to the driver’s device.
The attack relies on the coordination of Zemana Anti-Malware SDK drivers (zam.exe) for Windows 7 and WatchDog Anti-Malware on Windows 10 and 11, which provide remote access and control to the attacker, together with amsdk.sys (based on the Zemana SDK) used to install ValleyRAT (also known as Winos 4.0). Once installed, the malware performs checks for virtualized environments, sandbox execution, hypervisor presence, and other detection tests; if any of these checks fail, execution is aborted and a fake system error message is shown. The dropper is designed to communicate with a command-and-control (C2) server and deploy a modular ValleyRAT backdoor.
After these attacks, WatchDog released a security patch to address the LPE risk by applying a Discretionary Access Control List (DACL), but it did not fix the issue of arbitrary process termination without verification. This allowed attackers to adapt by incorporating a modified version that changes a single byte without invalidating Microsoft’s signature, effectively evading hash-based blocklists.
Recommendations
Protection
Detection
Mitigation
References
https://thehackernews.com/2025/09/silver-fox-exploits-microsoft-signed.html
Minsait Cyber
We promote the transformation of business and society through innovative solutions and services, putting people at the center.
Indra is one of the leading global technology and consulting companies: the technology partner for key operations of client businesses worldwide.
Tel.: +34 91 480 50 02
We promote the transformation of business and society through innovative solutions and services, putting people at the center.
Indra is one of the leading global technology and consulting companies: the technology partner for key operations of client businesses worldwide.