Wednesday, February 26, 2025
HomeAPTSilver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox, has been uncovered, targeting healthcare services in North America.

The attackers exploited Philips DICOM Viewer software to deploy malicious payloads, including a backdoor remote access tool (RAT), a keylogger, and a crypto miner.

This campaign highlights the evolving tactics of cybercriminals targeting critical sectors like healthcare.

Technical Analysis of the Attack

The Silver Fox group employed trojanized versions of MediaViewerLauncher.exe, the executable for Philips DICOM Viewer, as their primary attack vector.

These malicious samples were submitted to VirusTotal from the United States and Canada between December 2024 and January 2025.

The malware cluster demonstrated advanced evasion techniques, including PowerShell exclusions to bypass Windows Defender and encrypted payloads to avoid detection.

The infection process began with reconnaissance activities using native Windows utilities such as ping.exe and ipconfig.exe.

Following this, the malware contacted an Alibaba Cloud bucket to download encrypted payloads disguised as image files.

According to ForeScout, these payloads were decrypted into executable files that included TrueSightKiller (used to disable antivirus software), a backdoor (ValleyRAT), a keylogger, and a crypto miner.

Each stage of the malware was designed to evade detection through obfuscation techniques like API hashing and indirect control flow manipulation.

Once deployed, the ValleyRAT backdoor established communication with a command-and-control (C2) server hosted on Alibaba Cloud.

This allowed attackers to maintain persistent access to compromised systems while simultaneously logging user activity and exploiting system resources for cryptocurrency mining.

Broader Implications for Healthcare Security

Silver Fox’s campaign underscores the vulnerability of healthcare organizations to cyber threats beyond ransomware.

By targeting medical applications like DICOM viewers, which are often used by patients to access their medical images, the attackers exploit potential entry points into healthcare networks.

Infected patient devices brought into hospitals or connected through telehealth services could serve as conduits for further network compromise.

This campaign also marks an evolution in Silver Fox’s tactics.

Historically focused on Chinese-speaking victims and governmental institutions, the group has expanded its scope to include sectors such as finance, e-commerce, and now healthcare.

Their use of advanced techniques like DLL sideloading, process injection, and driver-based antivirus evasion reflects their growing sophistication.

To counter such threats, healthcare delivery organizations (HDOs) should adopt robust cybersecurity measures:

  • Restrict Software Sources: Avoid downloading software from untrusted sources or patient devices.
  • Network Segmentation: Isolate untrusted devices from critical hospital infrastructure.
  • Endpoint Protection: Deploy up-to-date antivirus or endpoint detection and response (EDR) solutions.
  • Continuous Monitoring: Monitor network traffic and endpoint activity for indicators of compromise (IoCs).
  • Proactive Threat Hunting: Actively search for malicious activity aligned with known APT behavior.

This incident serves as a stark reminder of the need for heightened vigilance in securing healthcare systems against emerging cyber threats.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

App with Over 100,000 Downloads from Google Play Steals User Data and Blackmails

A financial management app named Finance Simplified has been revealed as a malicious tool...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...