May 2025 APT Group Trends
Trends of major APT groups by country
1) North Korea
The North Korean APT group has been targeting Ukrainian government agencies. This is different from the group’s typical attack targets, so further observation is required to determine whether this is a one-time attack or a strategic alliance with Russia. North Korea is also attempting to infiltrate organizations by disguising themselves and getting employed in the cybersecurity and other industries. In the recruitment process, they use various methods, including resume manipulation using AI and disguising themselves as women.1
Konni
In February 2025, the Konni group launched a phishing campaign against Ukrainian government agencies to steal credentials and distribute malware. This activity is considered part of the North Korean regime’s strategic information-gathering operations.
| Case 1. | |
| Period | February 2025 |
| Target | Ukrainian government agencies |
| Initial Access |
– Sent a phishing email disguised as a Microsoft security alert using a Proton Mail account – Prompted recipients to click a link in the email to access a credential collection site – Distributed malware through an HTML attachment |
| Vulnerability Exploited | None |
| Malware and Tools | Konni |
| Technique |
· Phishing for collecting credentials · Distributing Malware Using an HTML Attachment · Command and Control (C2) Communication Using PowerShell |
| Damage | Not confirmed |
| Description |
· In February 2025, the threat actor targeted Ukrainian government agencies to collect credentials and distribute malware · It is considered that the attack was part of the threat actor’s efforts to evaluate the risk level of their own troops and potential requests for additional support, following North Korea’s deployment of troops to support Russia in the fall of 2024 |
| Source | TA406 Pivots to the Front[2] |
TA-RedAnt
The TA-RedAnt group distributed RoKRAT malware based on LNK through a spear-phishing attack disguised as a South Korean security think tank academic event.
| Case 1. | |
| Period | March 2025 |
| Target | North Korea-related activities and think tanks in the field of national security in South Korea |
| Initial Access |
– Distributed the ZIP Compressed File Containing a Dropbox Link via Spear Phishing Email · Additional malware being executed when the LNK shortcut file inside a compressed file is executed |
| Vulnerability Exploited | CVE-2022-41128 (Internet Explorer Vulnerability) |
| Malware and Tools | RokRAT |
| Technique |
· Spear phishing · Executed malware via LNK files · Distributed malware using Dropbox · Utilized Living off Trusted Sites (LoTS) |
| Damage | Not confirmed |
| Description |
· Utilizes the LoTS technique, which involves employing a legitimate cloud service as a command and control (C2) server, and deploys various attack strategies such as watering hole, spear phishing, and SNS phishing · Aside from Windows-based attacks, the group also targets Android users with malicious apps (APKs) and macOS users |
| Source | Analysis of APT37’s Disguised Attacks on a Korean National Security Strategy Think Tank (Operation: ToyBox Story)[3] |
2) China
The Chinese APT group used Google Calendar as C&C and exploited the zero-day vulnerability of the SaaS platform to launch attacks.
APT41
The APT41 group has been attacking government agencies and other targets using the TOUGHPROGRESS malware that exploits Google Calendar.
| Case 1. | |
| Period | October 2024 |
| Target | Government agencies, global maritime, logistics, media, entertainment, technology, and automotive industry organizations |
| Initial Access | Distributed Malicious ZIP File via Spear Phishing Email |
| Vulnerability Exploited | None |
| Malware and Tools |
· TOUGHPROGRESS · PLUSDROP |
| Technique |
· Using Google Calendar as a C2 channel · Executing payload in memory · Encryption and compression · Process Hollowing · Control flow obfuscation |
| Damage | Not confirmed |
| Description | Conducts spear-phishing attacks against organizations in various industries and employs sophisticated techniques such as using Google Calendar as a C2 channel |
| Source | Mark Your Calendar: APT41 Innovative Tactics[4] |
[1] https://news.sophos.com/en-us/2025/05/08/nickel-tapestry-expands-fraudulent-worker-operations/
[2] https://www.proofpoint.com/us/blog/threat-insight/ta406-pivots-front
[3] https://www.genians.co.kr/blog/threat_intelligence/toybox-story
[4] https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics/?hl=en
※ For more information, please refer to the attachment.