A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox, has been uncovered, targeting healthcare services in North America.
The attackers exploited Philips DICOM Viewer software to deploy malicious payloads, including a backdoor remote access tool (RAT), a keylogger, and a crypto miner.
This campaign highlights the evolving tactics of cybercriminals targeting critical sectors like healthcare.
Technical Analysis of the Attack
The Silver Fox group employed trojanized versions of MediaViewerLauncher.exe, the executable for Philips DICOM Viewer, as their primary attack vector.
These malicious samples were submitted to VirusTotal from the United States and Canada between December 2024 and January 2025.
The malware cluster demonstrated advanced evasion techniques, including PowerShell exclusions to bypass Windows Defender and encrypted payloads to avoid detection.
The infection process began with reconnaissance activities using native Windows utilities such as ping.exe
and ipconfig.exe
.
Following this, the malware contacted an Alibaba Cloud bucket to download encrypted payloads disguised as image files.
According to ForeScout, these payloads were decrypted into executable files that included TrueSightKiller (used to disable antivirus software), a backdoor (ValleyRAT), a keylogger, and a crypto miner.

Each stage of the malware was designed to evade detection through obfuscation techniques like API hashing and indirect control flow manipulation.
Once deployed, the ValleyRAT backdoor established communication with a command-and-control (C2) server hosted on Alibaba Cloud.
This allowed attackers to maintain persistent access to compromised systems while simultaneously logging user activity and exploiting system resources for cryptocurrency mining.
Broader Implications for Healthcare Security
Silver Fox’s campaign underscores the vulnerability of healthcare organizations to cyber threats beyond ransomware.
By targeting medical applications like DICOM viewers, which are often used by patients to access their medical images, the attackers exploit potential entry points into healthcare networks.
Infected patient devices brought into hospitals or connected through telehealth services could serve as conduits for further network compromise.
This campaign also marks an evolution in Silver Fox’s tactics.
Historically focused on Chinese-speaking victims and governmental institutions, the group has expanded its scope to include sectors such as finance, e-commerce, and now healthcare.
Their use of advanced techniques like DLL sideloading, process injection, and driver-based antivirus evasion reflects their growing sophistication.
To counter such threats, healthcare delivery organizations (HDOs) should adopt robust cybersecurity measures:
- Restrict Software Sources: Avoid downloading software from untrusted sources or patient devices.
- Network Segmentation: Isolate untrusted devices from critical hospital infrastructure.
- Endpoint Protection: Deploy up-to-date antivirus or endpoint detection and response (EDR) solutions.
- Continuous Monitoring: Monitor network traffic and endpoint activity for indicators of compromise (IoCs).
- Proactive Threat Hunting: Actively search for malicious activity aligned with known APT behavior.
This incident serves as a stark reminder of the need for heightened vigilance in securing healthcare systems against emerging cyber threats.
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup ->Â Try for free