May 2025 APT Group Trends

May 2025 APT Group Trends

 

Trends of major APT groups by country

 

1)   North Korea

 

The North Korean APT group has been targeting Ukrainian government agencies. This is different from the group’s typical attack targets, so further observation is required to determine whether this is a one-time attack or a strategic alliance with Russia. North Korea is also attempting to infiltrate organizations by disguising themselves and getting employed in the cybersecurity and other industries. In the recruitment process, they use various methods, including resume manipulation using AI and disguising themselves as women.1

 

Konni

 

In February 2025, the Konni group launched a phishing campaign against Ukrainian government agencies to steal credentials and distribute malware. This activity is considered part of the North Korean regime’s strategic information-gathering operations.

Case 1.
Period February 2025
Target Ukrainian government agencies
Initial Access

– Sent a phishing email disguised as a Microsoft security alert using a Proton Mail account

– Prompted recipients to click a link in the email to access a credential collection site

– Distributed malware through an HTML attachment

Vulnerability Exploited None
Malware and Tools Konni
Technique

·         Phishing for collecting credentials

·         Distributing Malware Using an HTML Attachment

·         Command and Control (C2) Communication Using PowerShell

Damage Not confirmed
Description

·         In February 2025, the threat actor targeted Ukrainian government agencies to collect credentials and distribute malware

·         It is considered that the attack was part of the threat actor’s efforts to evaluate the risk level of their own troops and potential requests for additional support, following North Korea’s deployment of troops to support Russia in the fall of 2024

Source TA406 Pivots to the Front[2]

 

TA-RedAnt

 

The TA-RedAnt group distributed RoKRAT malware based on LNK through a spear-phishing attack disguised as a South Korean security think tank academic event.

 

Case 1.
Period March 2025
Target North Korea-related activities and think tanks in the field of national security in South Korea
Initial Access

– Distributed the ZIP Compressed File Containing a Dropbox Link via Spear Phishing Email

·         Additional malware being executed when the LNK shortcut file inside a compressed file is executed

Vulnerability Exploited CVE-2022-41128 (Internet Explorer Vulnerability)
Malware and Tools RokRAT
Technique

·         Spear phishing

·         Executed malware via LNK files

·         Distributed malware using Dropbox

·         Utilized Living off Trusted Sites (LoTS)

Damage Not confirmed
Description

·         Utilizes the LoTS technique, which involves employing a legitimate cloud service as a command and control (C2) server, and deploys various attack strategies such as watering hole, spear phishing, and SNS phishing

·         Aside from Windows-based attacks, the group also targets Android users with malicious apps (APKs) and macOS users

Source Analysis of APT37’s Disguised Attacks on a Korean National Security Strategy Think Tank (Operation: ToyBox Story)[3]

 

2) China

 

The Chinese APT group used Google Calendar as C&C and exploited the zero-day vulnerability of the SaaS platform to launch attacks.

 

APT41

The APT41 group has been attacking government agencies and other targets using the TOUGHPROGRESS malware that exploits Google Calendar.

 

Case 1.
Period October 2024
Target Government agencies, global maritime, logistics, media, entertainment, technology, and automotive industry organizations
Initial Access Distributed Malicious ZIP File via Spear Phishing Email
Vulnerability Exploited None
Malware and Tools

·         TOUGHPROGRESS

·         PLUSDROP

Technique

·         Using Google Calendar as a C2 channel

·         Executing payload in memory

·         Encryption and compression

·         Process Hollowing

·         Control flow obfuscation

Damage Not confirmed
Description Conducts spear-phishing attacks against organizations in various industries and employs sophisticated techniques such as using Google Calendar as a C2 channel
Source Mark Your Calendar: APT41 Innovative Tactics[4]

 

 


[1] https://news.sophos.com/en-us/2025/05/08/nickel-tapestry-expands-fraudulent-worker-operations/

[2] https://www.proofpoint.com/us/blog/threat-insight/ta406-pivots-front

[3] https://www.genians.co.kr/blog/threat_intelligence/toybox-story

[4] https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics/?hl=en

 

※ For more information, please refer to the attachment.