Close Menu
geekfence.comgeekfence.com
    What's Hot

    Beware of headlines touting impossible AI benefits, analysts warn

    March 31, 2026

    OnePlus is Going Back to How it Started in India

    March 31, 2026

    Scientists discover AI can make humans more creative

    March 31, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»How Silver Fox preys on Japanese firms this tax season
    Cyber Security

    How Silver Fox preys on Japanese firms this tax season

    AdminBy AdminMarch 31, 2026No Comments5 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    How Silver Fox preys on Japanese firms this tax season
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them

    Dominik Breitenbacher
    Takahiro Sajima

    27 Mar 2026
     • 
    ,
    4 min. read

    A cunning predator: How Silver Fox preys on Japanese firms this tax season

    Japan has entered its annual tax filing and organizational change season, a period when companies generate a high volume of legitimate financial and HR‑related communications. A threat actor known as Silver Fox is actively exploiting this busy period by conducting a targeted spearphishing campaign against Japanese manufacturers and other businesses.

    The ongoing campaign uses convincing phishing lures related to tax compliance violations, salary adjustments, job position changes, and employee stock ownership plans. All emails share the same goal – trick the recipients into opening malicious links or attachments. As employees actually expect to receive emails about these subjects this time of year, they’re more likely to trust and act on such messages without a second thought. Needless to say, this significantly increases the risk of compromise.

    The operation is also a reminder for organizations to increase vigilance, reinforce awareness around phishing attempts, and ensure that employees verify the authenticity of tax‑ and HR‑themed requests – including those that look routine. Immediate reporting of suspicious emails to security teams is essential to reduce exposure and prevent successful compromise.

    What is the threat?

    Active since at least 2023, Silver Fox initially focused on Chinese-speaking targets before expanding into Southeast Asia, Japan, and potentially North America, running each campaign in a local language. This broadened scope shows in the range of verticals the group has hit over the years – finance, healthcare, education, gaming, government and even cybersecurity. The group also primarily operates in Southeast Asia and has a well-documented history of finance-themed spearphishing campaigns during seasonal business cycles.

    In the ongoing campaign, the group is taking advantage of Japan’s annual cycle of tax filing, financial reporting, salary adjustments, and personnel changes. This pattern isn’t new – similar activity was observed during the same period last year, indicating that Silver Fox deliberately aligns its operations with this season. The volume and urgency of legitimate internal communication around these topics is high this time of year, which is exactly what Silver Fox is counting on and what makes its campaigns effective.

    In this operation, Silver Fox sends tailored spearphishing emails crafted to look like legitimate HR or tax-related messages. To make the emails appear authentic, the attackers often include the name of the targeted company directly in the subject line. Examples of subjects observed in this campaign include:

    • 「会社名 」【従業員持株会規約改正に関するお知らせ】
      (Translation: Notice of amendments to the ESOP terms and conditions])
    • 「会社名 」【従業員持株会規約の一部改正について】
      (Translation: [Revisions to the ESOP Terms and Conditions])
    • 「会社名 」【人事異動・給与改定について】
      (Translation: [Personnel Changes and Salary Adjustments])
    • 税務コンプライアンスおよび罰金通知
      (Translation: Tax Compliance and Penalty Notice)

    The sender fields impersonate real employees and even CEOs at the targeted companies. Silver Fox is clearly doing some reconnaissance on each target before sending what aren’t generic blasts. The attackers are picking names that the targets are likely to recognize and trust, which makes it more difficult for the recipients to distinguish the malicious messages from real internal notifications.

    The emails typically contain either a malicious attachment or a link leading to a malicious file. The files are named to resemble common HR, financial, or tax-related documents, such as:

    • 【給与調整のお知らせ】
      (Translation: Salary Adjustment Notice)
    • 人事異動・給与改定について
      (Translation: Personnel Changes and Salary Adjustments)
    • 人事異動及び給与改定に関するお知らせ
      (Translation: Notice regarding personnel changes and salary adjustments)
    • 【従業員持株会規約の一部改正について】
      (Translation: [Partial amendment to the Employee Stock Ownership Plan terms and conditions])

    The following are examples of observed emails and lures:

    Figure_1_CN_SilverFox_spearphishing_2026-03-11
    Figure 1. Spearphishing email distributed on 2026-03-11
    Figure_2_CN_SilverFox_spearphishing_2026-03-12
    Figure 2. Spearphishing email distributed on 2026-03-12
    Figure_3_CN_SilverFox_tax-related_lure_webpage
    Figure 3. Tax-related lure webpage instructing the target to download a malicious file

    Opening the malicious files drops ValleyRAT, a remote access trojan that Silver Fox has used across multiple campaigns. ESET products detect this malware as Win64/Valley. Once deployed, ValleyRAT enables the actor to take remote control of the compromised machine, harvest sensitive information, monitor user activity, and maintain persistence in the targeted environment. This can allow the attacker to burrow deeper into the network, steal confidential data, or prepare additional stages of an attack.

    How to recognize the threat and protect yourself

    While Silver Fox’s emails may appear credible at the first glance, especially during Japan’s busy tax and organizational change season, a closer look reveals hints rendering the emails suspicious. The following signs are the key to recognizing and stopping the attack:

    • If you receive an email about salary changes, tax penalties, or personnel updates, verify it through a separate channel (Teams, phone, or direct email lookup) before acting on it. This applies even if the message looks routine.
    • Even if the sender’s name belongs (or seems to belong) to a colleague, make sure that the email address and the name match. If they don’t or the address looks unfamiliar, treat the email as suspicious.
    • Ask yourself whether this communication follows your company’s usual HR or Finance process.
    • Be cautious if the language feels overly formal, stiff, or mismatched with typical internal communications. Since the threat actor is not a native Japanese speaker, the emails may contain awkward phrasing and subtle giveaways.
    • Documents are unlikely to be shared through a publicly available file hosting services such as gofile[.]io or WeTransfer.
    • Pay attention to the attachment type. If it’s an archive such as RAR or ZIP, look at what’s actually inside before opening the files.
    • Install software updates when prompted.
    • Ensure your security software is running and up-to-date.
    • If something feels off about an email, forward it as an attachment to your IT or security team. Reporting is never a mistake – even if the email turns out to be legitimate.

    The following are illustrative examples of what to watch out for:

    Figure_4_CN_SilverFox_spearphishing_2026-03-12_indicators
    Figure 4. Signs revealing that the email is not legitimate
    Figure_5_CN_SilverFox_spearphishing_2026-03-11_indicators
    Figure 5. Signs revealing that this email is not legitimate, either

    IoCs

    A comprehensive list of indicators of compromise (IoCs) and samples can be found in our GitHub repository.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech

    March 30, 2026

    Why Professional Skills Matter in the Age of AI

    March 29, 2026

    Never knock on the door of a nuclear submarine base and ask for a selfie • Graham Cluley

    March 28, 2026

    Implementing Post-Quantum Cryptography in Android

    March 27, 2026

    Coruna iOS exploit framework linked to Triangulation attacks

    March 26, 2026

    The Kill Chain Is Obsolete When Your AI Agent Is the Threat

    March 25, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202527 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202624 Views

    Redefining AI efficiency with extreme compression

    March 25, 202622 Views
    Don't Miss

    Beware of headlines touting impossible AI benefits, analysts warn

    March 31, 2026

    It’s no big deal, you’d think, that researchers have found a way to reduce the…

    OnePlus is Going Back to How it Started in India

    March 31, 2026

    Scientists discover AI can make humans more creative

    March 31, 2026

    Why Some Businesses Seem to Win Online Without Ever Feeling Like They Are Trying

    March 31, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Beware of headlines touting impossible AI benefits, analysts warn

    March 31, 2026

    OnePlus is Going Back to How it Started in India

    March 31, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.