Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Utah Launches First-Ever AI Prescription Pilot in the U.S., Sparking Debate on Safety and Innovation

    January 13, 2026

    EU Widens Tech Crackdown, Targeting Musk’s Grok and TikTok Over Alleged AI Law Violations

    January 13, 2026

    Malicious Chrome Extensions Compromise 900,000 Users’ AI Chats and Browsing Data

    January 12, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI News
    Facebook X (Twitter) Instagram Pinterest VKontakte
    TallwireTallwire
    • Tech

      Malicious Chrome Extensions Compromise 900,000 Users’ AI Chats and Browsing Data

      January 12, 2026

      Wearable Health Tech Could Create Over 1 Million Tons of E-Waste by 2050

      January 12, 2026

      Viral Reddit Food Delivery Fraud Claim Debunked as AI Hoax

      January 12, 2026

      Activist Erases Three White Supremacist Websites onstage at German Cybersecurity Conference

      January 12, 2026

      AI Adoption Leaders Pull Ahead, Leaving Others Behind

      January 11, 2026
    • AI News
    TallwireTallwire
    Home»Tech»Silver Fox Leverages Signed WatchDog Driver to Sneak in ValleyRAT Backdoor
    Tech

    Silver Fox Leverages Signed WatchDog Driver to Sneak in ValleyRAT Backdoor

    Updated:December 25, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Silver Fox Leverages Signed WatchDog Driver to Sneak in ValleyRAT Backdoor
    Silver Fox Leverages Signed WatchDog Driver to Sneak in ValleyRAT Backdoor
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In a quietly alarming move, the Chinese-linked Silver Fox advanced persistent threat actor has exploited a Microsoft‑signed WatchDog anti‑malware driver (amsdk.sys v1.0.600) that wasn’t flagged by Microsoft’s vulnerable-driver blocklist or community trackers like LOLDrivers, to disable protection tools on Windows 10 and 11 systems and deploy the ValleyRAT remote‑access trojan via a “bring‑your‑own‑vulnerable‑driver” (BYOVD) method. Researchers uncovered that Silver Fox uses a sophisticated loader combining anti‑analysis checks, dual‑driver tactics (leveraging an older Zemana‑based driver on Windows 7 and this WatchDog driver on newer systems), EDR/AV killer logic, and modular ValleyRAT payloads, enabling stealthy persistence and evasion. A patched version of the driver addresses privilege escalation but not arbitrary process termination, and attackers have even bypassed blocklists by slightly tweaking the driver’s hash while preserving the Microsoft digital signature. 

    Sources: Hacker News, CheckPoint Research, SC World

    Key Takeaways

    – Signed doesn’t always mean safe – Even a Microsoft-signed driver (WatchDog) can carry exploitable vulnerabilities and slip through defense filters.

    – Dual-driver strategy boosts effectiveness – Silver Fox uses different drivers for legacy and modern Windows versions, wrapped in a single loader for broad compatibility and stealth.

    – Evasion keeps evolving – Attackers circumvent blocklists by altering the driver hash without breaking its signature, highlighting the need for more robust detection beyond simple allow-/deny lists.

    In-Depth

    Silver Fox’s latest campaign underscores a worrying reality in cybersecurity: adversaries can weaponize legitimate tools against us when our systems blindly trust signed code. By exploiting a Microsoft-signed WatchDog anti-malware driver (amsdk.sys v1.0.600), which wasn’t caught by either Microsoft’s own blocklist or community trackers like LOLDrivers, Silver Fox has found a clever way into Windows 10/11 machines undetected.

    Here’s how the trick works: the malware comes in a multi-purpose loader that checks whether it’s running in a sandbox or virtual machine, then quietly installs a driver—either the newly discovered WatchDog one or an older Zemana-based driver (for Windows 7 systems). Both can terminate security processes at will, smearing antivirus and endpoint defenses aside. Once that’s done, the ValleyRAT trojan gets deployed, granting remote access, data theft, or further control, depending on the attackers’ goals.

    Microsoft patched the privilege escalation vulnerability in later versions of the driver, but frustratingly, the ability to terminate protected processes remains. Even more cleverly, attackers have bypassed false-positive blocks by switching just one byte in the timestamp to tweak the file hash—yet the signature still validates. That kind of subtle evasion shows just how agile these threat actors have become.

    What’s the takeaway? Trust, but verify. Relying solely on signature-based trust or blocklists is no longer enough. Organizations—and even vigilant users—must layer defense: equip systems with heuristics, behavior-based detection, patch promptly, and treat any signed driver as potentially suspect until verified. In this ever-evolving threat landscape, that extra bit of cautious common sense can make a big difference.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSilicon Valley Tech Founder Joins Packed 2026 California Gubernatorial Race
    Next Article SimonMed Imaging Hit by Medusa Ransomware — Over 1.2 Million Patient Records Affected

    Related Posts

    Malicious Chrome Extensions Compromise 900,000 Users’ AI Chats and Browsing Data

    January 12, 2026

    Wearable Health Tech Could Create Over 1 Million Tons of E-Waste by 2050

    January 12, 2026

    Viral Reddit Food Delivery Fraud Claim Debunked as AI Hoax

    January 12, 2026

    Activist Erases Three White Supremacist Websites onstage at German Cybersecurity Conference

    January 12, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Malicious Chrome Extensions Compromise 900,000 Users’ AI Chats and Browsing Data

    January 12, 2026

    Wearable Health Tech Could Create Over 1 Million Tons of E-Waste by 2050

    January 12, 2026

    Viral Reddit Food Delivery Fraud Claim Debunked as AI Hoax

    January 12, 2026

    Activist Erases Three White Supremacist Websites onstage at German Cybersecurity Conference

    January 12, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) Instagram Pinterest YouTube
    • Tech
    • AI News
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.