SyncWave Blog
Cybersecurity 2 min read 82

Silver Fox intensifies its attacks: the new ABCDoor malware and phishing

The Silver Fox group is deploying the ABCDoor malware through tax-themed phishing campaigns targeting organizations in India and Russia.

cyber security phishing

The rise of Silver Fox and the threat of ABCDoor

The global cybersecurity landscape is facing a new threat from the Chinese-based cybercrime group known as Silver Fox. Recently, a sophisticated campaign has been detected using a new malware called ABCDoor to compromise the infrastructure of various organizations, with a strong geographic focus on India and Russia.

This group has demonstrated remarkable technical adaptability, using social engineering tactics to evade traditional defenses. Unlike other groups that seek massive ransomware deployment, Silver Fox appears to prioritize persistent access and the exfiltration of sensitive data.

Phishing as the primary attack vector

The strategy used by Silver Fox is based on deception through impersonation emails. In December 2025, the group launched a wave of messages mimicking official communications from the Income Tax Department of India. Shortly after, they replicated an almost identical tactic targeting Russian entities.

"Both waves followed a nearly identical methodology, demonstrating an operational standardization that facilitates the scalability of the attack," security experts note.

These types of campaigns underscore the importance of remaining alert to phishing, a vector that remains the favorite entry point for exploiting any human or technical vulnerability in companies.

How to protect yourself against these campaigns?

The sophistication of ABCDoor reminds us that no system is impenetrable. Prevention involves not only patching software but also implementing robust security layers:

  • Staff training: Train employees to identify suspicious emails that mimic government agencies.
  • Network monitoring: Detect unusual connections to command and control (C2) servers.
  • Patch management: Keeping systems updated is vital, especially when threats emerge, such as the recent CISA alert on a critical Linux vulnerability under active exploitation.

In conclusion, the hack perpetrated by Silver Fox is a reminder that attackers are constantly refining their methods. The combination of custom malware and sector-specific phishing campaigns requires organizations to adopt a proactive, zero-trust security approach.

Share:

Comments

Loading comments...

Contact

Want to get in touch?

Questions, suggestions or proposals — write to us and we will respond.