Silver Fox Exploits Microsoft-Signed WatchDog Driver for ValleyRAT Malware Deployment
In a concerning development within the cybersecurity landscape, the threat actor operating under the alias Silver Fox has been linked to the exploitation of an undisclosed vulnerable driver associated with WatchDog Anti-malware. This activity represents a sophisticated Bring Your Own Vulnerable Driver (BYOVD) attack strategy, designed to neutralize security defenses on targeted systems.
The driver in question, identified as “amsdk.sys” (version 1.0.600), is a legitimate, signed Windows kernel device driver that appears to be derived from the Zemana Anti-Malware SDK. According to an analysis by Check Point, this driver holds a Microsoft signature and is absent from the Microsoft Vulnerable Driver Blocklist, making it particularly insidious as it goes undetected by community-driven projects like LOLDrivers.
The attack employs a dual-driver approach, wherein the Silver Fox group leverages a well-known vulnerable Zemana driver, “zam.exe,” for Windows 7 systems, while deploying the undetected WatchDog driver on machines running Windows 10 and 11. This duality allows for a wider range of compromised environments, taking advantage of weaknesses in both older and more current operating systems.
Within the framework of the MITRE ATT&CK Matrix, this incident raises several pertinent tactics and techniques that may have been utilized by the attackers. The initial access may have stemmed from the flawed driver, enabling a foothold within the targeted systems. Following this, Silver Fox likely employed methods for persistence and privilege escalation, allowing them to execute further malicious activities, including the deployment of the ValleyRAT malware.
The ramifications of such a breach are significant, particularly for businesses reliant on effective endpoint security measures. As attackers increasingly turn to novel methodologies that exploit trusted components, the stakes rise for organizations that must remain vigilant in their cybersecurity efforts. The use of legitimate drivers in attacks complicates detection and response strategies, underscoring the need for enhanced monitoring and threat intelligence capabilities.
Given the sophistication of the attack and the choice of targets, often consisting of businesses operating under the radar of larger security measures, it is crucial for organizations to assess their current security posture. Regular reviews of installed drivers and vigilant monitoring for unusual kernel-level changes are essential steps to mitigate the risks associated with such vulnerabilities.
The Silver Fox exploitation case illustrates a growing trend in cyber threats where trusted infrastructure is weaponized. Business leaders must prioritize both awareness and resilience against such advanced threats to safeguard their operations and sensitive data in an ever-evolving digital landscape.