November 2025 APT Attack Trends Report (South Korea)

November 2025 APT Attack Trends Report (South Korea)

Overview   AhnLab is monitoring APT (Advanced Persistent Threat) attacks in South Korea using our own infrastructure. This report covers the classification and statistics of APT attacks in South Korea that were identified over the course of one month in November 2025. It also provides an overview of the features

October 2025 APT Attack Trends Report (South Korea)

October 2025 APT Attack Trends Report (South Korea)

Overview   AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea by utilizing their own infrastructure. This report covers the classification, statistics, and features of APT attacks in South Korea that were identified in October 2025. Figure 1. Statistics of APT attacks in South Korea in October 2025

September 2025 APT Attack Trends Report (South Korea)

September 2025 APT Attack Trends Report (South Korea)

Overview   Ahnlabs is monitoring APT (Advanced Persistent Threat) attacks in South Korea by utilizing their own infrastructure. This report covers the classification, statistics, and features of APT attacks in South Korea that were identified in September 2025. Figure 1. Statistics of APT attacks in September 2025 In Korea, most

August 2025 Threat Trend Report on APT Attacks (South Korea)

August 2025 Threat Trend Report on APT Attacks (South Korea)

Overview AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report covers the categorization and statistics of APT attacks in South Korea during August 2025 as well as functions for each type. Figure 1. August 2025 statistics on APT

July 2025 APT Attack Trends Report (South Korea)

July 2025 APT Attack Trends Report (South Korea)

Overview   AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report will cover the types and statistics of APT attacks in Korea during July 2025 as well as features for each type. Figure 1. July 2025 statistics on

Malicious LNK Disguised as Credit Card Security Email Authentication Pop-up

Malicious LNK Disguised as Credit Card Security Email Authentication Pop-up

AhnLab SEcurity intelligence Center (ASEC) has recently identified a case where a malicious LNK file is disguised as the credit card security email authentication pop-up to steal user information. The identified malicious LNK file has the following file name, disguising itself as the credit card company.   **card_detail_20250610.html.lnk   The threat actor has been

June 2025 APT Attack Trends Report (South Korea)

June 2025 APT Attack Trends Report (South Korea)

Overview   AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report will cover the types and statistics of APT attacks in Korea during June 2025 as well as features for each type.   Figure 1. June 2025 statistics

May 2025 APT Group Trends (South Korea)

May 2025 APT Group Trends (South Korea)

Overview   AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea using its own infrastructure. This report covers the classification, statistics, and features of APT attacks in Korea that were identified over the course of a month in May 2025.   Figure 1. Statistics of APT attacks in

April 2025 Threat Trend Report on APT Attacks (South Korea)

April 2025 Threat Trend Report on APT Attacks (South Korea)

Overview   AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea using its own infrastructure. This report covers the classification, statistics, and functions of APT attacks detected in South Korea over the course of one month in April 2025.   Figure 1. Statistics of APT attacks in South

Malicious LNK Disguised as Notices

Malicious LNK Disguised as Notices

AhnLab SEcurity intelligence Center (ASEC) recently discovered a malicious LNK file being distributed to Korean users for the purpose of stealing user information. This type of malware collects various valuable data for threat actors, such as data related to virtual assets, browsers, public certificates, and email files, and it also