April 2025 APT Group Trends

April 2025 APT Group Trends

 

Trends of major APT groups by country

 

1) North Korea

 

Since November 2024, the North Korean APT group has been exploiting the vulnerability of South Korean Internet financial security software. Similar attacks have been carried out in the past, and the threat actors have been launching attacks based on their understanding of the South Korean software ecosystem.

 

Konni

 

The Konni group distributed malware composed of an LNK file and AutoIT script through a spear phishing attack that impersonated a South Korean government agency.

 

Case 1.
Period From January to March 2025
Target Activists affiliated with a North Korea human rights and inter-Korean NGO
Initial Access Threat actors impersonated the National Human Rights Commission and the Korean National Police Agency to send spear phishing emails to recipients, urging them to reply. They then sent a malicious file.
Vulnerability N/A
Malware and Tool

·         Malicious file of LNK shortcut type

·         AutoIT script

Technique

·         Spear-phishing Disguised as Government Agency

·         Replying to Messages to Prompt Attacks

·         Using Non-Executable Malware

Damage Attempt to steal data and hack the device by installing malicious files
Description The Konni group impersonated a Korean government agency to launch spear phishing attacks. They distributed non-executable malware using LNK files and AutoIT scripts to infect users’ devices and steal data.
Source Analysis of Konni campaign impersonating the Korean National Police Agency and the National Human Rights Commission

 

Lazarus

 

The Lazarus group breached at least six South Korean industrial organizations through Operation SyncHole, a watering hole attack that exploited vulnerabilities in South Korean software.

 

Case 1.
Period November 2024 – March 2025
Target At least 6 organizations in South Korea’s software, IT, finance, semiconductor manufacturing, and telecommunications industries
Initial Access Watering hole attack
Vulnerability

·         Innorix Agent[2]

·         Cross EX[3]

Malware and Tools

·         ThreatNeedle

·         wAgent

·         Agamemnon downloader

·         SIGNBT

·         COPPERHEDGE

Technique

·         Watering hole

·         Exploiting Cross Ex vulnerability

·         Executing malware in memory

·         Lateral movement Using Innorix Agent

Damage

·         Breached at least 6 organizations in South Korea

·         Possibility of data breach and system compromise

Details

·         Attackers exploited the characteristics of the South Korean online environment

·         The Lazarus group has a deep understanding of South Korea’s software ecosystem and exploited it to launch supply chain attacks

·         Utilized a strategy similar to past campaigns such as Bookcode (2020), DeathNote (2022), and SIGNBT (2023)

Source Operation SyncHole: Lazarus APT goes back to the well[4]

 

2) China

 

Chinese APT groups are focusing their attacks on the Asian region. They have developed and are utilizing various techniques such as exploiting network device vulnerabilities and bypassing EDR products. An investigation is also being conducted on whether Earth Bluecrow is behind the breach of a Korean telecommunications company in April 2025.

 

APT41

 

APT41’s infrastructure was briefly exposed, and scripts, encrypted web shells, and reconnaissance tools that exploit the vulnerability of Fortinet devices were discovered.

 

Case 1.
Period March 2025
Target Japanese cosmetics company Shiseido
Initial Access

·         Attempted to gain initial access by exploiting the vulnerability of Fortinet firewall and VPN devices

·         Executed CLI commands through an unauthorized WebSocket endpoint

Exploited Vulnerability

·         CVE-2024-23108: Fortinet vulnerability

·         CVE-2024-23109: Fortinet vulnerability

Malware and Tools

·         KeyPlug backdoor

·         1.py: Detects Fortinet devices and identifies their versions​

·         ws_test.py: Exploitation of WebSocket CLI vulnerability

·         bx.php: A PHP web shell that decrypts and executes the encrypted payload in memory

·         fscan: Port scanning and service enumeration tool

Technique

– Executing commands via an unauthenticated WebSocket endpoint

·         Payload concealment using AES and XOR encryption

·         Network reconnaissance and internal portal exploration

Damage

·         Collected information on about 100 domains related to Shiseido

– Reconnaissance activities on internal systems and authentication portals

Description Exploited the vulnerability of Fortinet devices to gain initial access, then used an encrypted web shell and reconnaissance script to explore the target system
Source KeyPlug-Linked Server Briefly Exposes Fortinet Exploits, Webshells, and Recon Activity Targeting a Major Japanese Company[5]

 

Earth Bluecrow

 

The Earth Bulecrow group utilized a new controller for the BPFDoor backdoor to perform cyber espionage activities targeting the communication, finance, and retail industries in Asia and the Middle East.

 

Case 1.
Period 2021-Present
Targets Communication, finance, and retail industries in South Korea, Hong Kong, Myanmar, Malaysia, and Egypt
Initial Access Unknown (Under investigation)
Vulnerability Exploited Unknown
Malware and Tools BPFDoor (Backdoor.Linux.BPFDOOR)
Technique

·         Packet filtering using Berkeley Packet Filter (BPF)

·         Activating the backdoor using a network packet containing the ‘magic sequence’

·         Concealment through process name change without port listening

·         Communicating via TCP, UDP, and ICMP protocols

·         Controlled via password authentication and encrypted connection

Damage

·         Long-term concealment within the system

·         Lateral movement within the network using reverse shell

·         Access to sensitive data and additional system control

Description

·         BPFDoor is a backdoor designed forstate-sponsored cyber espionage activities. It bypasses firewalls and communicates stealthily using BPF.

·         Opened a reverse shell to expand the threat actor’s access within the infected network

Source BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets[6]

 

 


[1] https://www.genians.co.kr/blog/threat_intelligence/konni_disguise

[2] https://www.krcert.or.kr/kr/bbs/view.do?searchCnd=1&bbsId=B0000133&searchWrd=&menuNo=205020&pageIndex=6&categoryCode=&nttId=71686

[3] https://www.krcert.or.kr/kr/bbs/view.do?searchCnd=&bbsId=B0000133&searchWrd=&menuNo=205020&pageIndex=1&categoryCode=&nttId=71693

[4] https://securelist.com/operation-synchole-watering-hole-attacks-by-lazarus/116326/

[5] https://hunt.io/blog/keyplug-server-exposes-fortinet-exploits-webshells

[6] https://www.trendmicro.com/en_us/research/25/d/bpfdoor-hidden-controller.html