Silver Fox Uses Tax-Themed Phishing to Target India and Russia With ABCDoor and ValleyRAT

By Ash K
Silver Fox Uses Tax-Themed Phishing to Target India and Russia With ABCDoor and ValleyRAT

Tax notices work because they trigger a specific kind of panic. Silver Fox appears to be exploiting exactly that pressure point, turning official-looking tax messages into a delivery path for backdoors, RATs, and multi-stage malware.

The latest reporting from Kaspersky shows the group targeting organizations in India and Russia with campaigns that impersonate tax authorities and push victims toward malicious archives. The operation is notable not only for its scale, but for what it delivered: ValleyRAT, a customized RustSL loader, and a previously undocumented Python-based backdoor called ABCDoor.

What Happened

Kaspersky reported that Silver Fox used tax-themed phishing emails against organizations in India and Russia. The Indian wave appeared in December 2025, impersonating India’s Income Tax Department, while a similar campaign later targeted Russian organizations with near-identical social engineering patterns.

According to The Hacker News and Dark Reading summaries of Kaspersky’s research, more than 1,600 malicious messages were observed between early January and early February 2026. The impacted sectors included industrial, consulting, retail, and transportation organizations.

The emails were styled as official tax audit notices or messages prompting recipients to download an archive allegedly containing a list of tax violations. In multiple cases, the lure chain involved a PDF with clickable links leading to ZIP or RAR archives hosted on attacker-controlled infrastructure.

The Malware Chain

The archive contained an executable disguised as a PDF file. That binary was a modified version of RustSL, an open-source Rust-based shellcode loader and antivirus bypass framework. Silver Fox customized the loader to unpack encrypted payloads, apply geofencing checks, and avoid sandbox or virtual machine analysis.

The loader then delivered ValleyRAT, also known as Winos 4.0, a remote access Trojan already associated with Silver Fox activity. ValleyRAT provides command-and-control communications, command execution, and the ability to retrieve and execute additional modules on compromised hosts.

The standout addition is ABCDoor. Kaspersky described ABCDoor as a previously undocumented Python-based backdoor used by Silver Fox since at least late 2024 and observed in real-world attacks from the first quarter of 2025. The malware communicates over HTTPS and supports persistence, updates, removal, screenshot collection, remote mouse and keyboard control, file system operations, process management, and clipboard exfiltration.

Why This Stands Out

The campaign is not a simple phishing blast. It shows a layered delivery chain built to survive analysis and preserve access. Silver Fox used social engineering, archive delivery, a modified open-source loader, geofencing, anti-analysis checks, ValleyRAT, and ABCDoor in the same operational pipeline.

The geographic targeting is also important. Kaspersky noted that Silver Fox’s customized RustSL configuration included India, Indonesia, South Africa, Russia, and Cambodia in earlier builds, with Japan later added to the supported country list. The Hacker News reported that the highest number of attacks were detected in India, Russia, and Indonesia, followed by South Africa and Japan.

That pattern suggests the group is not locked to a single regional playbook. It is adapting lures, infrastructure, and malware configurations for different target countries while keeping the same operational skeleton intact.

Why Defenders Should Care

Tax-themed phishing has an operational advantage: recipients often expect urgency, attachments, penalties, audits, and official deadlines. That makes the lure especially effective against finance teams, compliance staff, procurement functions, administrators, and regional business units that regularly interact with tax authorities.

For defenders in India and Russia, the immediate risk is endpoint compromise through a user-driven infection chain. For multinational organizations, the wider concern is regional business units being used as entry points into shared identity systems, cloud services, file shares, and internal applications.

The presence of ABCDoor raises the stakes. Its capabilities go beyond one-time credential theft. Remote control, screenshots, file operations, clipboard theft, persistence, and update mechanisms give attackers the tools needed for surveillance, lateral movement preparation, and longer-term access.

What Security Teams Should Review

Organizations should search mail telemetry for tax audit lures, messages referencing lists of tax violations, suspicious PDF attachments, and links to compressed archives delivered between December 2025 and February 2026. Teams should also review downloads from unfamiliar domains, especially ZIP or RAR archives opened by finance, compliance, operations, or administrative users.

Endpoint teams should hunt for Rust-based loaders, suspicious executables masquerading as PDFs, unexpected scheduled tasks, Windows Registry Run key persistence, ValleyRAT indicators, Socket.IO-based HTTPS communications, and unusual clipboard, screenshot, or remote input activity.

Because the campaign used segmented infrastructure, blocking a single domain or address is unlikely to be enough. Detection should focus on the behavior chain: tax lure, archive download, fake PDF executable, loader execution, encrypted payload staging, C2 traffic, and post-compromise module activity.

Bigger Picture

Silver Fox continues to blur the line between cybercrime tooling and espionage-grade tradecraft. The group’s use of ValleyRAT, ABCDoor, custom loader modifications, and country-specific targeting shows a practical approach: use whatever works, localize the lure, and keep the malware chain flexible.

The campaign also reinforces a defender lesson that is easy to overlook. Official-looking emails do not need sophisticated language to succeed when the topic itself creates urgency. Taxes, audits, penalties, and compliance deadlines can do much of the attacker’s social engineering for them.

NeuraCyb's Assessment

This campaign should be read as a warning about localized phishing at scale. Silver Fox is not just sending malware; it is tuning pressure, geography, and payload choice to the target environment. For defenders, the most useful control is not a single indicator blocklist. It is the ability to connect the early human lure to the full technical chain before a fake tax notice becomes persistent access.

References

Kaspersky Securelist: Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India

The Hacker News: Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

Dark Reading: Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia

Ash K
Ash K
Ashton is a seasoned Cybersecurity Professional with over 25 years of experience in Cybersecurity Research, Cybersecurity Incident response, Products and Security Solutions architecture.