A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox, has been uncovered, targeting healthcare services in North America.
The attackers exploited Philips DICOM Viewer software to deploy malicious payloads, including a backdoor remote access tool (RAT), a keylogger, and a crypto miner.
This campaign highlights the evolving tactics of cybercriminals targeting critical sectors like healthcare.
The Silver Fox group employed trojanized versions of MediaViewerLauncher.exe, the executable for Philips DICOM Viewer, as their primary attack vector.
These malicious samples were submitted to VirusTotal from the United States and Canada between December 2024 and January 2025.
The malware cluster demonstrated advanced evasion techniques, including PowerShell exclusions to bypass Windows Defender and encrypted payloads to avoid detection.
The infection process began with reconnaissance activities using native Windows utilities such as ping.exe
and ipconfig.exe
.
Following this, the malware contacted an Alibaba Cloud bucket to download encrypted payloads disguised as image files.
According to ForeScout, these payloads were decrypted into executable files that included TrueSightKiller (used to disable antivirus software), a backdoor (ValleyRAT), a keylogger, and a crypto miner.
Each stage of the malware was designed to evade detection through obfuscation techniques like API hashing and indirect control flow manipulation.
Once deployed, the ValleyRAT backdoor established communication with a command-and-control (C2) server hosted on Alibaba Cloud.
This allowed attackers to maintain persistent access to compromised systems while simultaneously logging user activity and exploiting system resources for cryptocurrency mining.
Silver Fox’s campaign underscores the vulnerability of healthcare organizations to cyber threats beyond ransomware.
By targeting medical applications like DICOM viewers, which are often used by patients to access their medical images, the attackers exploit potential entry points into healthcare networks.
Infected patient devices brought into hospitals or connected through telehealth services could serve as conduits for further network compromise.
This campaign also marks an evolution in Silver Fox’s tactics.
Historically focused on Chinese-speaking victims and governmental institutions, the group has expanded its scope to include sectors such as finance, e-commerce, and now healthcare.
Their use of advanced techniques like DLL sideloading, process injection, and driver-based antivirus evasion reflects their growing sophistication.
To counter such threats, healthcare delivery organizations (HDOs) should adopt robust cybersecurity measures:
This incident serves as a stark reminder of the need for heightened vigilance in securing healthcare systems against emerging cyber threats.
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free
A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group has…
The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its initial…
Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade detection…
A financial management app named Finance Simplified has been revealed as a malicious tool for…
A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting trojan,…
In a groundbreaking development, researchers have uncovered how attackers are exploiting Windows Virtualization-Based Security (VBS)…