October 2025 APT Attack Trends Report (South Korea)

October 2025 APT Attack Trends Report (South Korea)

Overview

 

AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea by utilizing their own infrastructure. This report covers the classification, statistics, and features of APT attacks in South Korea that were identified in October 2025.


Figure 1. Statistics of APT attacks in South Korea in October 2025

The majority of APT attacks identified in South Korea were distributed using the spear phishing method. In particular, attacks using JSE files increased compared to the past and accounted for the largest proportion of attacks in October 2025.

 

Trend of APT Attacks in South Korea

The following are the details of the cases and features of the types of breaches in the APT attacks against South Korea that were identified in October 2025.

1)  Spear Phishing

Spear Phishing is a type of phishing attack that targets specific individuals or groups. Unlike regular phishing attacks, threat actors collect and gather information about their targets during the reconnaissance phase before launching their attacks. Threat actors utilize the gathered information to craft their phishing emails, making it more likely for recipients to trust the emails. There are also cases where threat actors forge the sender’s address through email spoofing. Most spear phishing attacks include malicious attachments or links in the emails, which prompt users to open them.

 

The following are the types of malware distributed using this technique.

 

1.1 Attacks Using LNK

Type A

This type involves executing RAT malware. It is mainly distributed in a compressed file format along with normal files. The distributed LNK file contains a malicious PowerShell command. The malware utilizes the Dropbox API or Google Drive to download the malware. It also creates additional script files and obfuscated RAT malware in the user’s PC. The executed RAT malware performs various malicious behaviors according to the threat actor’s command, such as keylogging and capturing screenshots. The identified RAT types are XenoRAT and RoKRAT.

 

The confirmed file name is as follows.

File Name

Vol. 1078 (Oct 2, 2025) No. ** (Part ***)
25.09.30-4025(****)***_Submission Schedule.lnk
How Will We Deal with “North Korea Armed with Nuclear Weapons”.lnk
Establishment of Inter-Korean Civilian Exchange and Cooperation Association (Draft)
Articles of Association of the Inter-Korean Civilian Exchange and Cooperation Association.lnk
Form for Writing Inheritance-Related Materials.lnk
Establishment Purpose Statement (October 7, 2025).lnk
General Election of the Ja Min Party (Dakaichi).lnk
Cost Estimate for the Institute of Unification and National Security Studies.lnk
North Korea’s Nuclear Threat in the Trump 2.0 Era, the U.S.-China Power Competition, and South Korea’s Nuclear Options.lnk
Association Organizational Chart (October 11, 2025).lnk

Table 1. Confirmed File Names

Type B

 

This type is responsible for downloading AutoIt malware. When the malicious PowerShell command in the LNK file is executed, it accesses an external URL and downloads additional files. A notable characteristic is that during this process, the curl.exe program is copied under a different file name (e.g., WpqNoXz.exe) and then executed. As a result, a legitimate AutoIt program and a malicious AutoIt script are downloaded. The downloaded files are then registered in the task scheduler to ensure that they are executed continuously. The malicious AutoIt script is capable of executing commands, searching directories, uploading files, and downloading files.

 

The confirmed file name is as follows.

File Name

Statement of the Source of Funds Not Reported (Enforcement Decree of the Value-Added Tax Act).hwp.lnk
Attachment 1. North Korean Human Rights Organization_Product Sponsorship_Proposal_**.hwp.lnk

Table 2. Confirmed file names

 

Decoy files are used to make it appear as if the user has executed a legitimate file.

 


Figure 2. Decoy file

 

 

MD5

089ae8b91642bc246bb0420cc811c5f3
0a546c215bbeb03d759f82d31d395ffe
0a564f880868e043978e36175f56d353
0c1e2150e5ce95d5ae31f02a449614b5
0ced9ecd0ebf44836962b12f18fb81aa
URL

http[:]//dlfleidj1[.]n-e[.]kr/
http[:]//newjo-imd[.]com/common/include/library/default[.]php
http[:]//newjo-imd[.]com/common/include/library/settings[.]ini
http[:]//www[.]qqwefafaw[.]p-e[.]kr/index[.]php
https[:]//b2bdoreka[.]com/wp-admin/css/plugin/climate/?rv=bear&za=battle0