Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Analysis of the Silver Fox Trojan’s Google Translate-imitating attack campaign

Redazione RHC : 1 August 2025 07:59

According to the Knownsec 404 Advanced Threat Intelligence Team, a surge in attack activity has recently been observed involving the Silver Fox Trojan, which mimics popular tools such as Google Translate. These attacks, dating back to 2024, involve a user clicking anywhere on the page displaying a message about an outdated version of Flash, followed by a redirect to a download page crafted by the attackers.

If the user downloads and executes the file, the system is compromised through the execution of subsequent payloads.

In recent years, several hacker groups have distributed the Silver Fox Trojan using various techniques: from forgery from download pages for common tools, to SEO optimization, to the creation of copies of national institutions’ websites. These strategies have contributed to increasingly compromising the Chinese internet download environment.

Sponsorizza la prossima Red Hot Cyber Conference!

Il giorno Lunedì 18 maggio e martedì 19 maggio 2026 9 maggio 2026, presso il teatro Italia di Roma (a due passi dalla stazione termini e dalla metro B di Piazza Bologna), si terrà la V edizione della la RHC Conference. Si tratta dell’appuntamento annuale gratuito, creato dalla community di RHC, per far accrescere l’interesse verso le tecnologie digitali, l’innovazione digitale e la consapevolezza del rischio informatico. Se sei interessato a sponsorizzare l'evento e a rendere la tua azienda protagonista del più grande evento della Cybersecurity Italiana, non perdere questa opportunità. E ricorda che assieme alla sponsorizzazione della conferenza, incluso nel prezzo, avrai un pacchetto di Branding sul sito di Red Hot Cyber composto da Banner più un numero di articoli che saranno ospitati all'interno del nostro portale. Quindi cosa stai aspettando? Scrivici subito a [email protected] per maggiori informazioni e per accedere al programma sponsor e al media Kit di Red Hot Cyber.



Supporta RHC attraverso:
  1. L'acquisto del fumetto sul Cybersecurity Awareness
  2. Ascoltando i nostri Podcast
  3. Seguendo RHC su WhatsApp
  4. Seguendo RHC su Telegram
  5. Scarica gratuitamente "Dark Mirror", il report sul ransomware di Dark Lab

Se ti piacciono le novità e gli articoli riportati su di Red Hot Cyber, iscriviti immediatamente alla newsletter settimanale per non perdere nessun articolo. La newsletter generalmente viene inviata ai nostri lettori ad inizio settimana, indicativamente di lunedì.

The Silver Fox group has been active since at least 2022, spreading Trojans through channels such as email, phishing sites, and instant messaging software. Following the release of the source code for remote control Trojans such as Winos 4.0, this gang transformed from a single organization into a full-fledged malware family, repurposed by other criminal groups and even APT organizations.

A technical analysis identified several phishing websites used to distribute Silver Fox, including fake copies of Google Translate, a currency converter, and even the official WPS download site. On these sites, the attackers inserted redirect scripts directly into the source code, leading victims to malicious pages.

Among the malicious installation packages discovered are MSI and EXE files that drop the Winos Trojan. In the case of MSI files, execution loads the aicustact.dll file to launch additional components, while update.bat launches both the legitimate program and the malicious payload. Javaw.exe then writes Microsoftdata.exe to the registry to ensure its persistence. The latter, written in Golang, reads and executes an Xps.dtd file, which contains shellcode intended to load a PE module called RexRat4.0.3, whose core component remains winos.

The winos Trojan, which belongs to the Silver Fox family, has numerous functions: it can capture screenshots, record keystrokes, on the keyboard and extract data from the clipboard. In addition to these, additional counterfeit programs used to spread the malware have been discovered, such as fake packages for Easy Translation, Youdao Translate, Bit browser, and LetsVPN.

In recent years, Silver Fox has evolved into a modular, tool-based malware, also used and modified by APT groups such as Golden Eye Dog. Attackers are primarily focusing on improving anti-detection techniques, such as code obfuscation or signature forgery, to make distribution more effective. This increases the risks for users who download software from unofficial sources, tricking them with pop-ups or clone sites.

Experts have reported that Silver Fox poses a serious threat to cybersecurity in China. To protect yourself, it’s recommended to remain vigilant about links, attachments, and packages from unknown sources, download software only from official sites or trusted app stores, and constantly update your operating systems and antivirus software. Only in this way can you significantly reduce the risk of infection.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli