Trends Report on Phishing Emails in February 2025

Trends Report on Phishing Emails in February 2025

1. Statistics on Attachment Threats in February 2025

In February 2025, the most prevalent threat type among phishing email attachments was Phishing (78%). This is the type where threat actors use HTML and other scripts to mimic login pages, advertising page layouts, logos, and fonts to create deceptive pages that can lure users into entering their account credentials. Subsequently, the threat actors transmit this information to their C2 server or lead users to fake sites. This type of phishing attack not only uses scripts but also includes hyperlinks in documents like PDFs to trick users into visiting phishing sites created by threat actors.

 

The second most common threat type is Trojan (12%). This malware tricks users into executing it by using double extensions or filenames with legitimate names.

 

The third most common threat type is malware that downloads additional malware from C2 (Downloader, 6%), followed by malware that steals user information (Infostealer, 4%), with FormBook being a prominent example. Following that, security vulnerability exploits (Exploit, <1%) were detected.

 

Compared to last month, the percentage of phishing malware increased significantly from 44% to 78% this month. The quantity also increased in addition to the percentage, showing that overall phishing threats were relatively higher. This is also seen in the statistics under [Trend in Phishing (FakePage) Distribution Volume].

Figure 1. Statistics on attachment threats

 

The statistics reflect the recent trends of threats posed by phishing emails by providing data on the distribution changes of samples in each category over the past six months. In addition, statistics on the extensions of attachments found in phishing emails allow users to identify the file formats used in such emails. Users can access these statistics and more in the original ATIP report.

 

2. List of Phishing Emails Distributed in Korean

Email Subject Attachment
FedEx Import Tax Invoice – 9914538167182 Invoice-9433.html
Customs Invoice Tax Forwarder SHIPMENT_AWB.html
Electronic Tax Invoice (*&*) -> Accounting Firm (****) Open in a New Window NTS_eTaxInvoice.html
*** (***->Co., Ltd. *** Engineering ********) NTS_eTaxInvoice.html
Bank Remittance Receipt jj_Remittance_receipt.html
New Electronic Tax Invoice (********Co. ,Ltd.) ->) Open in a New Window NTS_eTaxInvoice.html
Pending Custom AWB Invoice AWB_custom invoice.html
Email Allocation: (98% total) ******@******.co.kr_update.shtml
Your package has arrived at our office. sunilgupta shipping receipt793048897.html
Customs Payment Notification {Inv_Doc}.html
Quotation Request_***Tech_20250219 PO-G0170-PF3F-25-0329.cab
Quotation Request//H**-059690-PO-05870-********-Order H**-059690-PO-05870-*********-Order.zip
Re: ✈FedEx Cargo arrival notice fdxdoc_inv.shtml
FedEx shipment AWB release date has been set for 2/14/2025 3:03:28 a.m. SHIPMENT DOCUMENT.html
FedEx Custom AWB Invoice and Document Custom AWB invoice.htm
Attach new invoice to FedEx Billing Online Fedex invoice.html
DHL Shipment Invoice and AWB DHL Custom AWB invoice.htm
AWB Shipping Document – Customs Fee Fedex shipment AWB omh.html
✈Information on DHL EXPRESS Additional Services Related to Export and Import Inv_Doc.shtml
[Korea****] Buyer Inquiry Notice – 9567030369121 Inquire-2362.html
The tax invoice issued to [******.] has arrived. NTS_eTaxInvoice.html
[DHL KOREA] Invoice Notice:   D01937677 D01405477.html
 FW: Request to Check Suspicious Email PO-0058934.shtml
DHL 3037193913 (CS INSTRUMENT **** & CO) – Cargo Arrival Notice (Expected) 3037193913_AWB_20250106_440_20250106.html

Figure 2. Some of the phishing emails distributed in Korean

 

3) Case Study on Phishing Email Distribution

We analyzed representative cases by attachment format (Script, Document, Compress) to identify the phishing email attacks that took place this month. This month, phishing emails were distributed for malware of the downloader type, which uses a fake page, and malware of the infostealer type, which uses a document attachment. An “External Link” is inserted into the ‘\word\_rels\settings.rels’ file within the document, so when users open the document, the malicious behavior is triggered. Also, there has been a recent increase in cases where executables (.exe) developed in .NET are compressed and distributed in phishing emails. Readers can find additional information such as the C2 address, analysis details, and the body of the phishing email that distributed the malware in the original ATIP report.

Figure 3. Attached document (.docx)

This document contains an “external link” in the “\word\_rels\settings.rels” file, and upon execution, it downloads and executes additional malware from the C2. The additionally downloaded malware, when executed as an HTA file, downloads more malware again via PowerShell.

Figure 4. Malware distributed as an attachment in Compress format

The malware that is ultimately executed is a type of SnakeKeylogger malware, which collects various information present on the system (PC) and sends it to the C2. The threat actor is using a Telegram channel as the C2.

 

※ Please refer to the attachment for more details.

MD5

02d3d668592891bcf4f050e3d8c0f047
03919b5ce5ee158a5b77585d30a26065
0422f0de67654910c5e91ff2a49be7b9
1be217456fa30b8b78bfb2043bbf7d0f
1ee896eb5062be71b5a64050b1475a48