<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Spearphishing — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/spearphishing/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 28 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/spearphishing/feed.xml" rel="self" type="application/rss+xml"/><item><title>Silver Fox Spearphishing Campaign Targeting Japanese Firms During Tax Season</title><link>https://feed.craftedsignal.io/briefs/2026-03-silverfox-japan-tax-season/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-silverfox-japan-tax-season/</guid><description>The Silver Fox threat actor is conducting a targeted spearphishing campaign against Japanese manufacturers and other businesses, exploiting the annual tax filing and organizational change season by sending emails containing malicious attachments that deploy ValleyRAT, leading to remote access, data theft, and persistence.</description><content:encoded><![CDATA[<p>The Silver Fox threat actor, active since at least 2023, is conducting a spearphishing campaign targeting Japanese organizations during their annual tax filing and organizational change season. Initially focused on Chinese-speaking targets, Silver Fox has expanded its operations into Southeast Asia, Japan, and potentially North America. This campaign specifically exploits the high volume of legitimate financial and HR-related communications that occur during this period, making it more likely that employees will trust and act on malicious messages related to tax compliance violations, salary adjustments, job position changes, and employee stock ownership plans. The group has targeted a range of verticals including finance, healthcare, education, gaming, government and cybersecurity. This campaign is a repeat of similar activity observed during the same period last year, indicating a deliberate alignment of operations with this seasonal business cycle.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker performs reconnaissance on targeted Japanese companies, gathering information on employee names and roles within HR and finance departments.</li>
<li>Spearphishing emails are crafted to impersonate real employees or even CEOs at the targeted companies. The emails often include the targeted company&rsquo;s name in the subject line to enhance credibility.</li>
<li>The emails are sent to employees during Japan&rsquo;s tax filing and organizational change season, increasing the likelihood of the recipients opening the messages due to the expected volume of HR and financial communications.</li>
<li>The emails contain malicious attachments, such as ZIP or RAR archives, or links leading to malicious files hosted on public file-sharing services like gofile[.]io or WeTransfer.</li>
<li>The malicious files are named to resemble common HR, financial, or tax-related documents, such as &ldquo;Salary Adjustment Notice&rdquo; or &ldquo;Notice regarding personnel changes and salary adjustments.&rdquo;</li>
<li>When the recipient opens the malicious file, it drops ValleyRAT (detected as Win64/Valley by ESET products), a remote access trojan.</li>
<li>ValleyRAT enables the attacker to take remote control of the compromised machine, harvest sensitive information, and monitor user activity.</li>
<li>The attacker establishes persistence within the targeted environment, allowing for continued access and the potential for further malicious activities, such as data exfiltration or deploying additional malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this campaign can lead to a significant compromise of Japanese organizations, particularly manufacturers and businesses involved in finance, healthcare, education, gaming, government and cybersecurity. The deployment of ValleyRAT allows the attacker to gain remote access to compromised systems, potentially leading to the theft of sensitive financial data, intellectual property, and confidential employee information. This can result in financial losses, reputational damage, and legal repercussions for the affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect ValleyRAT Execution&rdquo; Sigma rule to identify instances where ValleyRAT is executed on endpoints (Sigma rule).</li>
<li>Monitor email traffic for subjects containing company names along with keywords related to tax, HR, and salary adjustments, and alert on unusual patterns (email logs).</li>
<li>Block connections to known malicious file hosting services like gofile[.]io and WeTransfer at the network level, as these are used to deliver the malicious payloads (network_connection logs).</li>
<li>Educate employees to verify any requests related to salary changes, tax penalties, or personnel updates through separate channels (awareness training).</li>
<li>Implement multi-factor authentication (MFA) for all email accounts to prevent unauthorized access (authentication logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>silverfox</category><category>spearphishing</category><category>valleyrat</category><category>japan</category><category>taxseason</category><category>remoteaccesstrojan</category></item><item><title>RagaSerpent 'Tax Audit' Campaign Targeting Multiple Countries</title><link>https://feed.craftedsignal.io/briefs/2026-03-ragaserpent-tax-audit/</link><pubDate>Sat, 21 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-ragaserpent-tax-audit/</guid><description>The RagaSerpent cluster, also known as SideWinder-Adjacent, is conducting targeted attacks across multiple countries between 2025 and 2026, associated with a 'Tax Audit' themed campaign.</description><content:encoded><![CDATA[<p>The RagaSerpent cluster, sometimes referred to as SideWinder-Adjacent, is an active threat actor targeting multiple countries between 2025 and 2026. Their activities are characterized by a campaign centered around a &ldquo;Tax Audit&rdquo; theme. This suggests potential targeting of individuals or organizations involved in financial activities or government entities responsible for tax administration. While specific technical details are limited in this brief, the multi-country scope and the social engineering aspect of the &ldquo;Tax Audit&rdquo; theme indicate a sophisticated and potentially widespread operation. Defenders should be aware of potential phishing attempts or malicious documents leveraging this theme.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to limited information, a detailed attack chain cannot be fully constructed. However, assuming a typical phishing-based delivery mechanism, a possible attack chain might look like this:</p>
<ol>
<li>Initial Access: The attacker sends a spearphishing email to a target, posing as a tax authority.</li>
<li>Delivery: The email contains a malicious attachment (e.g., a Microsoft Office document or PDF) or a link to a malicious website.</li>
<li>Exploitation: If the attachment is opened, it exploits a vulnerability (e.g., a macro or a CVE in the document reader) to execute arbitrary code.</li>
<li>Installation: The attacker installs a backdoor or malware on the victim&rsquo;s machine.</li>
<li>Command and Control: The malware establishes a connection with a command-and-control (C2) server to receive instructions.</li>
<li>Lateral Movement: The attacker uses the compromised machine to move laterally within the network, accessing other systems and resources.</li>
<li>Data Exfiltration: The attacker identifies and exfiltrates sensitive data, such as financial records or personal information.</li>
<li>Final Objective: The ultimate goal could be data theft, financial gain, or espionage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful RagaSerpent attacks leveraging a tax audit theme could lead to significant data breaches, financial losses, and reputational damage for targeted organizations. Individuals could experience identity theft and financial fraud. The multi-country scope suggests potentially widespread impact, affecting government agencies, financial institutions, and individuals across different regions. The specific damage will depend on the nature of the compromised data and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement and tune the provided Sigma rule to detect suspicious process executions potentially related to malicious document exploits (<code>rules[0]</code>).</li>
<li>Enable and review process creation logs (Sysmon or equivalent) for better visibility into potential exploit attempts as outlined in the rule&rsquo;s logsource (<code>rules[0].logsource</code>).</li>
<li>Deploy the generic network connection Sigma rule to identify potentially malicious outbound communication from unusual processes (<code>rules[1]</code>).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>RagaSerpent</category><category>SideWinder</category><category>Tax Audit</category><category>Spearphishing</category></item></channel></rss>