January 2025 Threat Trend Report on APT Attacks (South Korea)

January 2025 Threat Trend Report on APT Attacks (South Korea)

Overview AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea using its own infrastructure. This report covers the classification and statistics of APT attacks in South Korea that have been identified over the course of a month in January 2025, as well as the features of each attack

December 2024 Threat Trend Report on APT Attacks (South Korea)

December 2024 Threat Trend Report on APT Attacks (South Korea)

Overview  AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in South Korea. This report will cover the types and statistics of APT attacks in South Korea during December 2024 as well as features for each type. Figure 1. December 2024 statistics

November 2024 Threat Trend Report on APT Attacks (South Korea)

November 2024 Threat Trend Report on APT Attacks (South Korea)

Overview AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report will cover the types and statistics of APT attacks in Korea during November 2024 as well as features of each type.   Figure 1. November 2024 statistics on

October 2024 Threat Trend Report on APT Attacks (South Korea)

October 2024 Threat Trend Report on APT Attacks (South Korea)

Overview   AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report will cover the types and statistics of APT attacks in Korea during October 2024 as well as features of each type.     Figure 1. October 2024

Threat Trend Report on APT Attacks (South Korea) – September 2024 Major Issues on APT Attacks in South Korea

Threat Trend Report on APT Attacks (South Korea) – September 2024 Major Issues on APT Attacks in South Korea

This report covers classification and statistics on APT domestic attacks confirmed during the month of September 2024 and introduces the functions of each type.  Below is a summary of some of the information. [Table of Contents] Overview Trends of APT Attacks in Korea Spear Phishing Attacks Using LNK Files Attacks Using

Kimsuky Group’s Malware  Disguised as Lecture Request Form (MSC, HWP)

Kimsuky Group’s Malware Disguised as Lecture Request Form (MSC, HWP)

Recently, malware disguised as a lecture request form targeting specific users was identified.  The distributed files include Hangul Word Processor (HWP) documents and files in MSC format, which download additional malicious files. Decoy document files used to disguise as legitimate documents have been found to sometimes contain personal information, suggesting

Threat Trend Report on APT Attacks – August 2024 Major Issues on APT Attacks in South Korea

Threat Trend Report on APT Attacks – August 2024 Major Issues on APT Attacks in South Korea

This report covers classification and statistics on APT domestic attacks confirmed during the month of August 2024 and introduces the functions of each type.  Below is a summary of some of the information.  [Table of Contents] Overview Trends of APT Attacks in Korea Spear Phishing Attacks Using LNK Files Attacks Using

Threat Trend Report on APT Attacks – July 2024 Major Issues on APT Attacks in South Korea

Threat Trend Report on APT Attacks – July 2024 Major Issues on APT Attacks in South Korea

This report covers classification and statistics on APT domestic attacks confirmed during the month of July 2024 and introduces the functions of each type.  Below is a summary of some of the information. [Table of Contents] Overview Trends of APT Attacks in Korea Spear Phishing Attacks Using LNK Files Attacks Using

Warning Against Distribution of Malware Impersonating a Public Organization (LNK)

Warning Against Distribution of Malware Impersonating a Public Organization (LNK)

AhnLab Security Emergency response Center (ASEC) observed the distribution of malicious shortcut (*.lnk) files impersonating a public organization. The threat actor seems to be distributing a malicious script (HTML) file disguised as a security email by attaching it to emails. These usually target individuals in the field of Korean reunification

Warning Against HWP Documents Embedded with Malicious OLE Objects

Warning Against HWP Documents Embedded with Malicious OLE Objects

AhnLab Security Emergency response Center (ASEC) found HWP documents that were embedded with OLE objects, targeting individuals in specific sectors such as the national defense and the press. The malware is presumed to be distributed mainly through download URLs or attachments in emails. The file names of the distributed documents