How the Silver Fox Group Exploits Tax Authorities to Deploy ABCDoor Backdoor: A Step-by-Step Guide for Security Analysts

By

Introduction

In December 2025, a wave of malicious emails impersonating the Indian tax service began targeting organizations across multiple sectors. By January 2026, a nearly identical campaign emerged against Russian entities. Both attacks have been attributed to the threat group known as Silver Fox. This step-by-step guide walks analysts through the full attack chain—from the initial phishing email to the deployment of a previously undocumented Python-based backdoor we call ABCDoor. By following these steps, you can better detect, analyze, and defend against similar campaigns.

How the Silver Fox Group Exploits Tax Authorities to Deploy ABCDoor Backdoor: A Step-by-Step Guide for Security Analysts
Source: securelist.com

What You Need

Step-by-Step Analysis

Step 1: Identify the Phishing Email

Both campaigns used emails styled as official tax authority correspondence. The December version targeted Indian organizations with a subject line related to tax audits and included an archive (ITD.-.rar) or a PDF with download links. The January version targeted Russian entities with a PDF attachment containing links to a malicious ZIP archive hosted at abc.haijing88[.]com/uploads/фнс/фнс.zip.

Step 2: Analyze the Attachment and Extract the Payload

In the Indian campaign, the archive ITD.-.rar contains a single executable (Click File.exe) disguised with an Adobe PDF icon. This is the initial loader. In the Russian campaign, the PDF contains two clickable links that lead to the same ZIP archive. Inside the ZIP, you find a modified Rust-based loader.

Step 3: Reverse-Engineer the RustSL Loader

The loader, named RustSL, is a Rust-based program originally hosted on GitHub (now taken down or modified). The Silver Fox variant includes modified strings and callbacks that connect to a command-and-control (C2) server to download the next stage. Analyze the binary using static analysis (e.g., strings, Ghidra) to find:

Note: The loader is designed to blend in with legitimate Rust binaries, so focus on unusual network connections during dynamic analysis.

Step 4: Observe the Download and Execution of ValleyRAT

Once executed, the RustSL loader contacts its C2 and retrieves the well-known backdoor ValleyRAT. This RAT gives attackers remote control over the infected machine. In this campaign, ValleyRAT was observed performing typical post-exploitation tasks like keylogging, screen capture, and file exfiltration.

Step 5: Find the New ABCDoor Backdoor Plugin

During the investigation, analysts discovered that ValleyRAT was also delivering a new plugin to victim machines. This plugin functions as a loader for a Python-based backdoor that our team named ABCDoor. ABCDoor appears to be part of the Silver Fox arsenal since at least late 2024. The plugin is dropped by ValleyRAT and then executes ABCDoor in memory.

How the Silver Fox Group Exploits Tax Authorities to Deploy ABCDoor Backdoor: A Step-by-Step Guide for Security Analysts
Source: securelist.com

Step 6: Assess the Campaign Scope and Impact

Between early January and early February 2026, over 1,600 malicious emails were recorded. The affected sectors include industrial, consulting, retail, and transportation in both India and Russia. The attackers specifically chose tax authority themes to maximize urgency and compliance. The use of PDF links (instead of direct attachments) significantly increased the delivery rate by bypassing email security scanners.

Tips for Defending Against Silver Fox Campaigns

By understanding the full attack chain—from the deceptive email to the final backdoor—you can build more effective defenses against Silver Fox and similar threat actors.

Related Articles

Recommended

Discover More

Zero-Copy Data Loading: mssql-python Now Natively Supports Apache Arrow for Blazing Fast SQL Server QueriesBrowser-Based Light Pollution Simulator: Real Photometric Data Drives Accurate Skyglow AnalysisNavigating Airline Shutdowns: Lessons from Spirit Airlines' CollapseSUSE Unveils AI-Native Infrastructure Layer for Enterprise Clouds at KubeCon Europe 2026The Paradox of Bee Virus Detection: Awareness Without Avoidance