A recent cyber attack orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox, has targeted healthcare services in North America. The attackers utilized a sophisticated campaign that exploited vulnerabilities in Philips DICOM Viewer software to deploy a range of malicious tools, including a backdoor remote access tool (RAT), a keylogger, and a crypto miner. This incident sheds light on the evolving tactics of cybercriminals who are increasingly targeting critical sectors like healthcare.
The technical analysis of the attack reveals the intricacies of Silver Fox’s operation. The group used trojanized versions of MediaViewerLauncher.exe, the executable for Philips DICOM Viewer, as their primary attack vector. These malicious samples were detected in the United States and Canada between December 2024 and January 2025. The malware displayed advanced evasion techniques, such as PowerShell exclusions to bypass Windows Defender and encrypted payloads to evade detection. The infection process began with reconnaissance activities using native Windows utilities like ping.exe and ipconfig.exe. Subsequently, the malware communicated with an Alibaba Cloud server to download encrypted payloads disguised as image files. Once decrypted, these payloads contained various malicious tools, including TrueSightKiller, a backdoor (ValleyRAT), a keylogger, and a crypto miner. Each stage of the malware was carefully designed to avoid detection through obfuscation techniques like API hashing and indirect control flow manipulation.
The deployment of the ValleyRAT backdoor allowed the attackers to establish communication with a command-and-control (C2) server hosted on Alibaba Cloud. This enabled them to maintain persistent access to compromised systems, monitor user activity, and exploit system resources for cryptocurrency mining. The attack underscores the vulnerability of healthcare organizations to cyber threats beyond traditional ransomware attacks. By targeting medical applications like DICOM viewers, the attackers found a potential entry point into healthcare networks. Infected patient devices brought into hospitals or connected through telehealth services could serve as conduits for further network compromise.
This campaign also signifies a shift in Silver Fox’s tactics, expanding their focus from Chinese-speaking victims and governmental institutions to sectors like finance, e-commerce, and now healthcare. The group’s use of advanced techniques like DLL sideloading, process injection, and driver-based antivirus evasion highlights their increasing sophistication. In response to such threats, healthcare delivery organizations (HDOs) are advised to implement robust cybersecurity measures, including restricting software sources, network segmentation, endpoint protection, continuous monitoring, and proactive threat hunting.
This incident serves as a stark reminder of the necessity for heightened vigilance in securing healthcare systems against emerging cyber threats. It underscores the critical importance of cybersecurity in protecting sensitive patient data and maintaining the integrity of healthcare services. As cyber threats continue to evolve and become more sophisticated, healthcare organizations must remain vigilant and proactive in defending against malicious actors seeking to exploit system vulnerabilities.

