Threat Trend Report on APT Groups – June 2025 Major APT Group Trends

Threat Trend Report on APT Groups – June 2025 Major APT Group Trends

Purpose and Scope

This report covers nation-led threat groups, presumed to conduct cyber espionage or sabotage supported by certain governments. These groups are referred to as advanced persistent threat (APT) groups for the sake of convenience. Therefore, this report does not contain information on cybercriminal groups aiming to gain financial profits.

 

We organized analyses related to APT groups disclosed by security companies and institutions including AhnLab during the previous month; however, the content of some APT groups may not have been included.

 

The names and classification criteria may vary depending on the security company or researcher, and in this report, we used well-known names of AhnLab Threat Intelligence Platform (ATIP)’s threat actors.

 

 

Major APT Group Trends by Country

 

1)   North Korea

 

North Korean APT groups used GitHub PATs to turn private repositories into attack infrastructure. Also, they continue to pose as remote IT workers to join companies and steal information for financial profit. The US government has also prosecuted North Korean IT workers and those who help them.

 

Jasper Sleet

 

North Korean threat actors such as Jasper Sleet have been found posing as remote IT workers, creating fake identity documents with AI and using RMM tools to try to infiltrate companies and steal information for financial profit.

Case 1.
Time 2018 – October 2024
Attack Target

·         US technology, critical manufacturing, and transportation companies

·         Global companies hiring for technology-related positions in various industries

·         Some government agencies (at least two in the US)

Initial Breach

·         Used fake resumes and IDs to infiltrate the remote IT hiring process

·         Created fake portfolios and accounts on LinkedIn, GitHub, and freelance sites

·         Contacted recruiters or intermediaries on Facebook, Telegram, and other platforms when necessary

Vulnerability Used None
Malware and Tools

·         Faceswap and other AI image generation and editing tools

·         Voice changer software

·         RMM tools (TinyPilot, Rust Desk, TeamViewer, AnyViewer, Anydesk, etc.)

·         VPN/Astrill VPN

·         VPS/Proxy

·         IP-based KVM devices (PiKVM, TinyPilot)

Technique

·         Infiltrates the hiring process using fake identities and profiles

·         Makes ID and profile photos and changes voices with AI

·         After being hired, delivers company hardware to an accomplice and uses it for remote access

·         Hides location and activities with RMM and VPN

·         Avoids video interviews with false excuses or having an accomplice attend instead

Damage

·         Exfiltration of confidential information, such as source code, IP, and trade secrets

·         Infiltrated at least 64 US companies and obtained more than $860,000

Description

·         North Korean IT workers used Chinese or Russian IP addresses or stolen foreign identities to apply for US and global IT jobs, and used AI to forge identity documents to gain trust.

·         After being hired, they sent company hardware to North Korea or an accomplice, or connected to an accomplice’s laptop farm to work remotely.

·         Then, they installed RMM software, used a VPN to hide their location, and had an accomplice handle video or in-person interviews if necessary.

Source Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations[1]

 

Kimsuky

 

The Kimsuky group used Facebook, email, and Telegram to launch a spear phishing campaign against activists in North Korea and defense sectors, spreading AppleSeed malware, and stealing confidential information in a three-step combo attack.

Case 1.
Period March – April 2025
Attack Target South Korea’s defense industry and defense sector
Initial Breach

·         Sent friend requests on Facebook Messenger to start a conversation and deliver a malicious file

·         Sent a malicious compressed file by email

·         Sent a malicious file via Telegram message

Vulnerability Used None
Malware and Tools AppleSeed
Technique

·         Multi-step approach through Facebook, email, and Telegram (three-step combo)

·         Pretends to support North Korean defectors to gain trust, then sends a malicious file

·         Evades detection by using the EGG compressed file format

·         Runs Windows Script Host (JSE), loading DLL with regsvr32, and securing persistence

·         Hides collected information with RC4 and RSA encryption, and sends it disguised as a PDF

·         Continuous command and control communication with the C2 server

Damage

·         Exfiltration of confidential information from infected systems

·         Executing commands and resending through the C2 server

Description

·         The Kimsuky group uses three channels—Facebook, email, and Telegram—to try to communicate with their targets. They pretend to be volunteers for North Korean defectors and send an EGG archive file that contains a malicious JSE file.

·         Compared to previous cases, there is a high similarity in the use of JSE and DLL files and in the attack patterns. They also use the Korean EGG compression format and try to avoid detection by prompting users to use a decompression program.

Source Analysis of the Kimsuky group’s three-step combo threat[2]

The Kimsuky group used a hard-coded GitHub PAT to turn private repositories into attack infrastructure, carrying out a sophisticated spear phishing attack that spread XenoRAT and uploaded victim information.

 

Case 2.
Period March – May 2025
Attack Target Individuals in South Korea facing financial, legal, or cryptocurrency-related situations
Initial Breach

·         Sent spear phishing emails impersonating a Korean law firm

·         The attached malicious compressed file contains an LNK and PowerShell-based downloader that leads to initial infection

Vulnerability Used None
Malware and Tools

·         XenoRAT

·         onf.txt

·         ofx.txt

·         Github PAT(Personal Access Token)

·         PowerShell script

Technique

·         Uses GitHub private repositories and hard-coded PAT for command and control and data leak

·         Malware distribution using Dropbox

·         Uses tailored decoy documents (such as debt collection notices, power of attorney documents, etc.)

·         Maintains persistence through the Task Scheduler and regular log uploads

·         Uses XenoRAT to control infected systems, perform keylogging, and steal information

Damage

·         Stole the victim’s personal and system information

·         Continuous collection of information, including keylogging and clipboard data

Description

·         The Kimsuky group operates multiple private repositories on GitHub dedicated to attacks, and manages decoy documents, Infostealers, logs files in each repository.

·         Many collected XenoRAT variants had the same build environment (GUID) and encryption method. The reuse of test IPs from previous MoonPeak cases linked to Kimsuky and the same C2 server used for Naver phishing sites also indicates a link to Kimsuky.

Source Analysis of Kimsuky’s latest attacks in South Korea using GitHub as attack infrastructure[3]

 


[1] https://www.microsoft.com/en-us/security/blog/2025/06/30/jasper-sleet-north-korean-remote-it-workers-evolving-tactics-to-infiltrate-organizations/

[2] https://www.genians.co.kr/blog/threat_intelligence/triple-combo

[3] https://www.enki.co.kr/media-center/blog/dissecting-kimsuky-s-attacks-on-south-korea-in-depth-analysis-of-github-based-malicious-infrastructure

 

※ For more information, please refer to the attachment.