June 2025 APT Attack Trends Report (South Korea)

June 2025 APT Attack Trends Report (South Korea)

Overview

 

AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report will cover the types and statistics of APT attacks in Korea during June 2025 as well as features for each type.

 


Figure 1. June 2025 statistics on APT attacks in Korea

 

 

Most APT attacks identified in Korea were spread through spear phishing. In June 2025, LNK file-based spear phishing attacks were the most prevalent, while those using Hangul Word Processor (HWP) files also saw an increase compared to the previous month.

 

Trends of APT Attacks in Korea

The cases and features for each APT attack type identified in June 2025 are as follows.

 

 

1)  Spear Phishing

 

Spear phishing is a type of phishing attack against specific individuals or groups. Unlike ordinary phishing attacks, the threat actor conducts reconnaissance before launching the attacks to collect information on and learn about the attack targets. Because the threat actor crafts phishing emails using the collected information, the recipients of the emails are highly likely to believe that they are from a trusted source. There are also cases where the sender’s address is manipulated through email spoofing. Most spear phishing attacks include malicious attachments or links that are intended to lure the user to open them.

 

Types distributed using this technique are as follows.

 

1.1. Attacks Using LNK Files

 

Type A

 

This type involves creating a compressed CAB file containing multiple malicious scripts to exfiltrate information and download additional malware. The distributed LNK file contains a malicious PowerShell command, which is used to extract the data of the CAB file and decoy document inside the LNK file, creating them on the user’s PC. The CAB file is then decompressed, and multiple script files (bat, ps1, vbs, etc.) included inside are executed. The executed script files can perform malicious behaviors such as exfiltrating information from the user’s PC and downloading additional files.

 

The confirmed file names are as follows.

File Name

Signal Marketplace Transaction History Verification and Feedback Submission Form_20250617.docx.lnk
Preliminary Opinion on Allowing Corporate Accounts for Virtual Asset Exchanges (CoinMarket).hwp.lnk
Instructions on Submitting Proof Documents Related to KB Bank Transfer and Transaction History (20250622).hwp.lnk
Instructions on Submitting Proof Documents for KB Bank Transfer and Transaction Details (20250625).hwp.lnk
Guide to Submitting Materials for Identifying the Source of Undeclared Funds (Enforcement Decree of the Value-Added Tax Act).hwp.lnk
Guide to Submitting Data to Identify the Source of Undeclared Funds.hwp.lnk
Cryptocurrency Receiving Confirmation.docx.lnk
Lim**_15-year Career Technical Skills and Resume_20250521.docx

Table 1. Confirmed file names

 

In some of these LNK distribution cases, the compressed file contained both the LNK file and a legitimate document. The legitimate document is as follows.

 

 


Figure 2. Legitimate document included in the compressed file

 

 


Figure 3. Legitimate document included in the compressed file

 

 

Type B

 

This type executes RAT malware. They are generally distributed as compressed files alongside legitimate files. The LNK files found in distribution contained malicious PowerShell commands. The malware either downloads using DropBox API or Google Drive, or creates additional script files and obfuscated RAT malware in system folders like “%PUBLIC%” on the user’s PC. The RAT malware executed in the end can perform various malicious behaviors, such as keylogging and taking screenshots, according to commands from the threat actor. XenoRAT and RokRAT were some of the RAT types found in this case.

 

The confirmed file names are as follows.

File Name

National Intelligence Service and Investigation.docx

Table 2. Detected file names

 

Below are decoy files that were used to deceive the user into thinking they executed a legitimate file.

 


Figure 4. Confirmed decoy file

 

MD5

046aab6c2bcd4f87b70edd14330f326b
0a9ade25e1e4ed3ac00bc5c962f3a7d7
17dd5fe925cec9f4dccca5f31f1e0fcf
23ddf65355e433a2469c7712cb843d5f
24c758962495c5b33fb87c0cdcd71f1e
URL

http[:]//121[.]130[.]80[.]107/pprb/d[.]php?newpa=bimage
http[:]//121[.]130[.]80[.]107/pprb/d[.]php?newpa=sch
http[:]//garkyo[.]com/garkyocom/upload/image/index[.]php
http[:]//iscope[.]kr/upload/copedown[.]php
http[:]//sunintr[.]com/attach/compo[.]php
IP

174[.]138[.]186[.]157
74[.]50[.]68[.]253