Thursday, April 24, 2025
HomeAPTValleyRAT Attacking Org’s Accounting Department with New Delivery Techniques

ValleyRAT Attacking Org’s Accounting Department with New Delivery Techniques

Published on

SIEM as a Service

Follow Us on Google News

A concerning uptick in cyberattacks has emerged with ValleyRAT, a Remote Access Trojan (RAT) linked to the Silver Fox advanced persistent threat (APT) group.

The malware is now employing innovative delivery techniques to infiltrate organizational networks, targeting finance and accounting departments.

Recent reports from Morphisec Threat Labs indicate that the attackers have refined their tools and strategies, making ValleyRAT more potent than ever.

- Advertisement - Google News

The latest ValleyRAT campaign begins with users being lured into downloading malicious software mimicking legitimate applications.

ValleyRAT Infection Chain
ValleyRAT Infection Chain

A fake Chrome browser, hosted on phishing websites like “anizom[.]com” or via domains impersonating reputed Chinese businesses, serves as the primary infection vector.

For instance, the attackers created a counterfeit website, “karlost[.]club,” designed to resemble the legitimate Chinese telecom provider, “karlos[.]com.cn.”

Once unsuspecting users execute the downloaded package (“Setup.exe”), the malware initiates a multi-stage payload delivery, masked as innocuous files including “sscronet.dll” and “douyin.exe.”

These components are stored in system directories to evade detection.

Refined Exploitation Techniques

ValleyRAT employs DLL search order hijacking, leveraging legitimate signed executables like Steam-related binaries to inject malicious code.

The malware uses game files from titles such as Left 4 Dead 2 and Killing Floor 2 to conceal its activities.

After deployment, it utilizes advanced techniques such as memory injection into critical Windows processes like “svchost.exe,” enabling it to execute malicious payloads while avoiding detection by traditional endpoint security solutions.

Persistence mechanisms are another hallmark of the malware.

For example, ValleyRAT modifies system registries under the guise of legitimate software, embedding itself into startup processes with entries like “MyPythonApp.”

It also exploits keylogging functionality, capturing sensitive information and recording keystrokes in hidden files such as “sys.key.”

Additionally, the malware integrates anti-virtual machine capabilities to detect sandbox environments, a tactic that further enhances its ability to evade cybersecurity tools during forensic analysis.

Strategic Focus on Accounting and Finance Departments

What sets this campaign apart is its strategic targeting of high-value organizational roles.

Finance and accounting professionals, holding access to sensitive systems, are prime targets for this malware strain.

This focus signals a deliberate intent to exploit critical business operations for financial gain or data exfiltration.

According to the Morphisec report, the ValleyRAT campaign underscores the growing sophistication of advanced persistent threat actors and their evolving delivery techniques.

Traditional detection-based cybersecurity measures may fall short against such innovative attacks.

Organizations are encouraged to adopt preemptive strategies, such as Moving Target Defense (MTD), which can proactively mitigate risks by disrupting the attack chain before payload execution.

By focusing on adaptive and layered security models, businesses can protect sensitive departments like accounting from being a playground for next-generation cyber threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...