<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Japan — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/japan/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 28 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/japan/feed.xml" rel="self" type="application/rss+xml"/><item><title>Silver Fox Spearphishing Campaign Targeting Japanese Firms During Tax Season</title><link>https://feed.craftedsignal.io/briefs/2026-03-silverfox-japan-tax-season/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-silverfox-japan-tax-season/</guid><description>The Silver Fox threat actor is conducting a targeted spearphishing campaign against Japanese manufacturers and other businesses, exploiting the annual tax filing and organizational change season by sending emails containing malicious attachments that deploy ValleyRAT, leading to remote access, data theft, and persistence.</description><content:encoded><![CDATA[<p>The Silver Fox threat actor, active since at least 2023, is conducting a spearphishing campaign targeting Japanese organizations during their annual tax filing and organizational change season. Initially focused on Chinese-speaking targets, Silver Fox has expanded its operations into Southeast Asia, Japan, and potentially North America. This campaign specifically exploits the high volume of legitimate financial and HR-related communications that occur during this period, making it more likely that employees will trust and act on malicious messages related to tax compliance violations, salary adjustments, job position changes, and employee stock ownership plans. The group has targeted a range of verticals including finance, healthcare, education, gaming, government and cybersecurity. This campaign is a repeat of similar activity observed during the same period last year, indicating a deliberate alignment of operations with this seasonal business cycle.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker performs reconnaissance on targeted Japanese companies, gathering information on employee names and roles within HR and finance departments.</li>
<li>Spearphishing emails are crafted to impersonate real employees or even CEOs at the targeted companies. The emails often include the targeted company&rsquo;s name in the subject line to enhance credibility.</li>
<li>The emails are sent to employees during Japan&rsquo;s tax filing and organizational change season, increasing the likelihood of the recipients opening the messages due to the expected volume of HR and financial communications.</li>
<li>The emails contain malicious attachments, such as ZIP or RAR archives, or links leading to malicious files hosted on public file-sharing services like gofile[.]io or WeTransfer.</li>
<li>The malicious files are named to resemble common HR, financial, or tax-related documents, such as &ldquo;Salary Adjustment Notice&rdquo; or &ldquo;Notice regarding personnel changes and salary adjustments.&rdquo;</li>
<li>When the recipient opens the malicious file, it drops ValleyRAT (detected as Win64/Valley by ESET products), a remote access trojan.</li>
<li>ValleyRAT enables the attacker to take remote control of the compromised machine, harvest sensitive information, and monitor user activity.</li>
<li>The attacker establishes persistence within the targeted environment, allowing for continued access and the potential for further malicious activities, such as data exfiltration or deploying additional malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this campaign can lead to a significant compromise of Japanese organizations, particularly manufacturers and businesses involved in finance, healthcare, education, gaming, government and cybersecurity. The deployment of ValleyRAT allows the attacker to gain remote access to compromised systems, potentially leading to the theft of sensitive financial data, intellectual property, and confidential employee information. This can result in financial losses, reputational damage, and legal repercussions for the affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect ValleyRAT Execution&rdquo; Sigma rule to identify instances where ValleyRAT is executed on endpoints (Sigma rule).</li>
<li>Monitor email traffic for subjects containing company names along with keywords related to tax, HR, and salary adjustments, and alert on unusual patterns (email logs).</li>
<li>Block connections to known malicious file hosting services like gofile[.]io and WeTransfer at the network level, as these are used to deliver the malicious payloads (network_connection logs).</li>
<li>Educate employees to verify any requests related to salary changes, tax penalties, or personnel updates through separate channels (awareness training).</li>
<li>Implement multi-factor authentication (MFA) for all email accounts to prevent unauthorized access (authentication logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>silverfox</category><category>spearphishing</category><category>valleyrat</category><category>japan</category><category>taxseason</category><category>remoteaccesstrojan</category></item></channel></rss>