Threat detection

Detecting malicious AnonymousFox email messages sent from compromised sites

December 4, 2024

Detecting malicious AnonymousFox email messages sent from compromised sites

Catch malicious email messages sent from sites that have been compromised by an AnonymousFox attack.

Ready to see Sublime 
in action
Get a demo
Authors
Sam Scholten
Sam Scholten
Detection

AnonymousFox is a threat actor group that has been active since 2019, specializing in the creation of tools that exploit plugin vulnerabilities across various CMS platforms, including WordPress, Drupal, Joomla, and OpenCart. Since then, there have been a wide variety of resources available showing how the hack works, how to detect it, and how to fix it. But even with widespread prevention information, this attack hasn’t gone away.

Recently, we’ve seen an uptick of activity with our AnonymousFox indicators Detection Rule. That means sites are still being compromised and used to further distribute the attack. Sublime is able to keep malicious messages sent by compromised servers out of mailboxes. Before we look at how we do it, here’s a quick refresher on how AnonymousFox works.

How AnonymousFox works

Once AnonymousFox is able to exploit a plugin vulnerability, the group's suite of tools (FoxAuto, Fox Ex, Fox RSF, Fox-CGI, etc.) grants the attacker complete control over the website(s) and enables a range of malicious activities. These activities include resetting passwords, uploading scripts, installing mailers, hosting files, and more.

AnonymousFox console

With control over the site, the attackers can easily distribute malware and phishing links using a variety of methods, including PHP mailers and hacked email accounts that use standard SMTP to send out messages. This allows them to bypass spam filters and leverage the reputation of the compromised site(s) to send out malicious email campaigns.

We've seen a wide range of variants, but generally, the email messages sent from compromised servers are straightforward, plaintext fraud attempts. Here's an example of one of these attempts:

Fraudulent message from a compromised system

Catching AnonymousFox email messages with Sublime

These methods listed above tend to leave behind artifacts or anomalies in the message headers, such as the presence of "anonymousfox" or "smtpfox" in the local component of various authentication email headers. Depending on the configuration, one of those artifacts may even appear as the sender email address. For example: X-Authenticated-Sender: smtpfox-1aevb@example.com

Sublime’s AI-powered detection engine is able detect these malicious messages and thereby reduce the attack’s spread. This prevention is enabled right out of the box, but in this post we’ll take a deeper dive into the Message Query Language (MQL) and signals used to detect these malicious emails:



name: "Headers: AnonymousFox Email Indicators"
description: |
Detects emails that contain (anonymous|smtp)fox in the sender email address, X-Authenticated-Sender or X-Sender fields. This is indicative of emails sourced from an AnonymousFox compromised website.
reference:
- "https://sucuri.net/guides/anonymousfox-hack-guide/"
type: "rule"
severity: "high"
source: |
type.inbound
and
any(headers.hops,
any(.fields,
regex.icontains(.name, "X-Authenticated-Sender|X-Sender") and
regex.icontains(.value, "(anonymous|smtp)fox-"))
or regex.icontains(sender.email.email, "(anonymous|smtp)fox-"))
tags:
- "Suspicious sender"

This AnonymousFox rule uses the following logic:

  1. type.inbound to filter down to inbound emails.
  2. Then it uses the any function to iterate over the hops and fields of the email headers.
  3. Within the iteration, the regex.icontains function is used to search for header fields with names X-Authenticated-Sender or X-Sender that contain "(anonymous|smtp)fox-" in their values.
  4. The or operator is used to also search for the sender email address containing “(anonymous|smtp)fox-".

Keep the Fox out of your inbox

AnonymousFox is still a threat, and as it evolves, so will we. Sublime uses a combination of open-source detection rules and AI-powered techniques to detect and prevent threats like this one.

Start your free Sublime account today (managed or self-managed) to keep AnonymousFox out of your inbox. Book a live demo if you have any specific questions for our team.

Heading

About the authors

Sam Scholten
Sam Scholten
Detection

Sam is the Head of Detection at Sublime. Prior to Sublime, he was a Staff Email Security Researcher at Proofpoint where he developed a business email compromise (BEC) taxonomy and formulated key detection methodologies and rules.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

December 29, 2025
5 email security trends from 2025
Sublime news

5 email security trends from 2025

Brian BaskinPerson
Brian Baskin
Threat Research
Person
December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person
December 16, 2025
Evolving our brand as Sublime grows
Sublime news

Evolving our brand as Sublime grows

Omar JalalzadaPerson
Omar Jalalzada
Head of Design
Kirk JohnsonPerson
Kirk Johnson
Creative Director

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern