Threat detection

Detecting malicious AnonymousFox email messages sent from compromised sites

December 4, 2024

Detecting malicious AnonymousFox email messages sent from compromised sites

Catch malicious email messages sent from sites that have been compromised by an AnonymousFox attack.

Ready to see Sublime 
in action
Get a demo
Authors
Sam Scholten
Sam Scholten
Detection

AnonymousFox is a threat actor group that has been active since 2019, specializing in the creation of tools that exploit plugin vulnerabilities across various CMS platforms, including WordPress, Drupal, Joomla, and OpenCart. Since then, there have been a wide variety of resources available showing how the hack works, how to detect it, and how to fix it. But even with widespread prevention information, this attack hasn’t gone away.

Recently, we’ve seen an uptick of activity with our AnonymousFox indicators Detection Rule. That means sites are still being compromised and used to further distribute the attack. Sublime is able to keep malicious messages sent by compromised servers out of mailboxes. Before we look at how we do it, here’s a quick refresher on how AnonymousFox works.

How AnonymousFox works

Once AnonymousFox is able to exploit a plugin vulnerability, the group's suite of tools (FoxAuto, Fox Ex, Fox RSF, Fox-CGI, etc.) grants the attacker complete control over the website(s) and enables a range of malicious activities. These activities include resetting passwords, uploading scripts, installing mailers, hosting files, and more.

AnonymousFox console

With control over the site, the attackers can easily distribute malware and phishing links using a variety of methods, including PHP mailers and hacked email accounts that use standard SMTP to send out messages. This allows them to bypass spam filters and leverage the reputation of the compromised site(s) to send out malicious email campaigns.

We've seen a wide range of variants, but generally, the email messages sent from compromised servers are straightforward, plaintext fraud attempts. Here's an example of one of these attempts:

Fraudulent message from a compromised system

Catching AnonymousFox email messages with Sublime

These methods listed above tend to leave behind artifacts or anomalies in the message headers, such as the presence of "anonymousfox" or "smtpfox" in the local component of various authentication email headers. Depending on the configuration, one of those artifacts may even appear as the sender email address. For example: X-Authenticated-Sender: smtpfox-1aevb@example.com

Sublime’s AI-powered detection engine is able detect these malicious messages and thereby reduce the attack’s spread. This prevention is enabled right out of the box, but in this post we’ll take a deeper dive into the Message Query Language (MQL) and signals used to detect these malicious emails:

name: "Headers: AnonymousFox Email Indicators"
description: |
  Detects emails that contain (anonymous|smtp)fox in the sender email address, X-Authenticated-Sender or X-Sender fields. This is indicative of emails sourced from an AnonymousFox compromised website. 
reference:
  - "https://sucuri.net/guides/anonymousfox-hack-guide/"
type: "rule"
severity: "high"
source: |
  type.inbound
  and
  any(headers.hops, 
      any(.fields, 
          regex.icontains(.name, "X-Authenticated-Sender|X-Sender") and 
          regex.icontains(.value, "(anonymous|smtp)fox-"))
      or regex.icontains(sender.email.email, "(anonymous|smtp)fox-"))
tags:
  - "Suspicious sender"

This AnonymousFox rule uses the following logic:

  1. type.inbound to filter down to inbound emails.
  2. Then it uses the any function to iterate over the hops and fields of the email headers.
  3. Within the iteration, the regex.icontains function is used to search for header fields with names X-Authenticated-Sender or X-Sender that contain "(anonymous|smtp)fox-" in their values.
  4. The or operator is used to also search for the sender email address containing “(anonymous|smtp)fox-".

Keep the Fox out of your inbox

AnonymousFox is still a threat, and as it evolves, so will we. Sublime uses a combination of open-source detection rules and AI-powered techniques to detect and prevent threats like this one.

Start your free Sublime account today (managed or self-managed) to keep AnonymousFox out of your inbox. Book a live demo if you have any specific questions for our team.

Heading

About the authors

Sam Scholten
Sam Scholten
Detection

Sam is the Head of Detection at Sublime. Prior to Sublime, he was a Staff Email Security Researcher at Proofpoint where he developed a business email compromise (BEC) taxonomy and formulated key detection methodologies and rules.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

March 18, 2026
Advanced fake Zoom installer used for delivering malware
Attack spotlight

Advanced fake Zoom installer used for delivering malware

Kyle Eaton
Kyle Eaton
Detection
Threat Research Team
Threat Research Team
Sublime
March 10, 2026
Announcing Sublime Email DLP: Data loss prevention at the outbox
Sublime news

Announcing Sublime Email DLP: Data loss prevention at the outbox

AJ Williams
AJ Williams
Product Manager
Madison Caldwell
Madison Caldwell
Engineering
Gregory Climer
Gregory Climer
Engineering
March 3, 2026
How we built high speed threat hunting for email security
Sublime news

How we built high speed threat hunting for email security

Hugh Oh
Hugh Oh
Engineering

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern