August 2025 Threat Trend Report on APT Attacks (South Korea)

August 2025 Threat Trend Report on APT Attacks (South Korea)

Overview AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report covers the categorization and statistics of APT attacks in South Korea during August 2025 as well as functions for each type. Figure 1. August 2025 statistics on APT

July 2025 APT Attack Trends Report (South Korea)

July 2025 APT Attack Trends Report (South Korea)

Overview   AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report will cover the types and statistics of APT attacks in Korea during July 2025 as well as features for each type. Figure 1. July 2025 statistics on

RokRAT Malware Using Malicious Hangul (.HWP) Documents

RokRAT Malware Using Malicious Hangul (.HWP) Documents

AhnLab SEcurity intelligence Center (ASEC) recently discovered the distribution of RokRAT malware using a Hangul Word Processor document (.hwp). RokRAT is typically distributed by including a decoy file and malicious script inside a shortcut (LNK) file. However, ASEC found a case where the malware was distributed through HWP documents instead

June 2025 APT Attack Trends Report (South Korea)

June 2025 APT Attack Trends Report (South Korea)

Overview   AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report will cover the types and statistics of APT attacks in Korea during June 2025 as well as features for each type.   Figure 1. June 2025 statistics

May 2025 APT Group Trends (South Korea)

May 2025 APT Group Trends (South Korea)

Overview   AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea using its own infrastructure. This report covers the classification, statistics, and features of APT attacks in Korea that were identified over the course of a month in May 2025.   Figure 1. Statistics of APT attacks in

April 2025 Threat Trend Report on APT Attacks (South Korea)

April 2025 Threat Trend Report on APT Attacks (South Korea)

Overview   AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea using its own infrastructure. This report covers the classification, statistics, and functions of APT attacks detected in South Korea over the course of one month in April 2025.   Figure 1. Statistics of APT attacks in South

March 2025 APT Group Trends (South Korea)

March 2025 APT Group Trends (South Korea)

Overview   AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea using its own infrastructure. This report covers the classification, statistics, and features of the APT attacks in South Korea that were identified in March 2025, as well as the attack types.     Figure 1. Statistics of

Malicious HWP Document Disguised as Reunification Education Support Application

Malicious HWP Document Disguised as Reunification Education Support Application

On March 5, AhnLab SEcurity intelligence Center (ASEC) found a post recruiting students for a unification-related course, which included a link to download a malicious HWP document. At the time of analysis, there were download links for JPG, HWP, and DOC files at the bottom of the post. The HWP

February 2025 APT Group Trends (South Korea)

February 2025 APT Group Trends (South Korea)

Overview   AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea using its own infrastructure. This report covers the classification, statistics, and features of the APT attacks in South Korea that were identified in February 2025, as well as the attack types.   Figure 1. Statistics of APT

Kimsuky Group’s Malware  Disguised as Lecture Request Form (MSC, HWP)

Kimsuky Group’s Malware Disguised as Lecture Request Form (MSC, HWP)

Recently, malware disguised as a lecture request form targeting specific users was identified.  The distributed files include Hangul Word Processor (HWP) documents and files in MSC format, which download additional malicious files. Decoy document files used to disguise as legitimate documents have been found to sometimes contain personal information, suggesting