top of page

Silver Fox APT Exploits Philips DICOM Viewer to Deploy Backdoor and Crypto Miner

In a stark reminder that cyber threats to healthcare extend well beyond ransomware, a new campaign by the China-based advanced persistent threat (APT) group Silver Fox has surfaced, leveraging trojanized versions of Philips DICOM Viewer to infiltrate healthcare systems. The attackers deployed a sophisticated malware cluster, including a backdoor (ValleyRAT), a keylogger, and a crypto miner, highlighting an alarming evolution in their tactics.

Healthcare Under Siege: Beyond Ransomware

Healthcare remains the most targeted critical infrastructure sector, with attacks jeopardizing patient care and sensitive medical data. While ransomware has dominated headlines, the Silver Fox campaign represents a more insidious threat—covert exploitation of medical applications for sustained espionage and financial gain.

“We have no evidence that Philips or its medical devices were compromised to distribute malicious versions of the DICOM Viewer,” Forescout Research – Vedere Labs stated in an update. “The threat actor used techniques such as phishing and watering holes to distribute malware, consistent with past campaigns targeting DICOM viewers.”

Silver Fox’s Evolving Tactics

Researchers discovered 29 malware samples posing as Philips DICOM Viewer’s MediaViewerLauncher.exe, all submitted to VirusTotal from North America between December 2024 and January 2025. Further analysis uncovered additional instances disguised as software utilities, reflecting a methodical evolution of Silver Fox’s malware:

  • July 2024: Basic PowerShell evasion tactics and minimal system utility usage.

  • August 2024: More sophisticated evasion techniques, including multiple PowerShell exclusion commands.

  • October–December 2024: Additional system directory exclusions and enhanced obfuscation.

  • January 2025: Advanced PowerShell layers, demonstrating increased stealth capabilities.

Silver Fox’s transition from targeting Chinese-speaking users to attacking English-language healthcare software signals a deliberate expansion into new regions and industries.

Infection Chain: From DICOM Viewer to ValleyRAT

The malware execution flow follows a structured, multi-stage approach:

  1. Initial Infection: Trojanized MediaViewerLauncher.exe acts as a first-stage payload, performing reconnaissance and disabling security defenses through PowerShell exclusions.

  2. Payload Deployment: The malware connects to an Alibaba Cloud bucket, downloading and decrypting secondary payloads.

  3. Persistence & Evasion: Using scheduled tasks, the malware ensures execution at user login while obfuscating its presence via API hashing and sandbox evasion tactics.

  4. Final Payloads: The attack culminates in the execution of ValleyRAT (a backdoor), a keylogger, and a crypto miner, all communicating with a command-and-control (C2) server.

At the time of discovery, the Alibaba Cloud storage buckets remained accessible, though the C2 infrastructure appeared inactive.

What This Means for Healthcare Security

While initial infections may target individual patients using DICOM Viewers at home, the real risk lies in potential lateral movement into hospital networks. Healthcare delivery organizations (HDOs) must be proactive in mitigating this evolving threat landscape.

Mitigation Strategies

  • Restrict software downloads: Avoid downloading medical software from untrusted sources.

  • Isolate patient devices: Implement strict network segmentation between guest devices and critical hospital infrastructure.

  • Strengthen endpoint security: Deploy and maintain up-to-date antivirus or endpoint detection and response (EDR) solutions.

  • Monitor network traffic: Conduct continuous surveillance of endpoint telemetry and internet-bound connections.

  • Proactive threat hunting: Investigate anomalies aligning with known Silver Fox tactics to preempt attacks.

The Bigger Picture

Silver Fox’s latest campaign underscores a broader trend: threat actors are shifting from blunt-force ransomware attacks to stealthier, long-term infiltration of healthcare systems. As cybercriminal groups masquerade as nation-state actors—and vice versa—defenders must stay ahead of evolving tactics, techniques, and procedures (TTPs).

For healthcare organizations, the battle against cyber threats is no longer a question of ‘if’ but ‘when.’ With advanced adversaries like Silver Fox targeting critical medical applications, the industry must fortify its defenses before patient safety and data integrity are irreparably compromised.

bottom of page