August 2025 Threat Trend Report on APT Attacks (South Korea)

August 2025 Threat Trend Report on APT Attacks (South Korea)

Overview AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report covers the categorization and statistics of APT attacks in South Korea during August 2025 as well as functions for each type. Figure 1. August 2025 statistics on APT

July 2025 APT Attack Trends Report (South Korea)

July 2025 APT Attack Trends Report (South Korea)

Overview   AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report will cover the types and statistics of APT attacks in Korea during July 2025 as well as features for each type. Figure 1. July 2025 statistics on

June 2025 APT Attack Trends Report (South Korea)

June 2025 APT Attack Trends Report (South Korea)

Overview   AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in Korea. This report will cover the types and statistics of APT attacks in Korea during June 2025 as well as features for each type.   Figure 1. June 2025 statistics

XwormRAT Being Distributed Using Steganography

XwormRAT Being Distributed Using Steganography

AhnLab SEcurity intelligence Center (ASEC) collects information on malware distributed through phishing emails by using its own “email honeypot system.” Based on this information, ASEC publishes the “Phishing Email Trend Report” and “Infostealer Trend Report” on the ASEC Blog every month. Recently, XwormRAT has been confirmed to be distributed using

May 2025 APT Group Trends (South Korea)

May 2025 APT Group Trends (South Korea)

Overview   AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea using its own infrastructure. This report covers the classification, statistics, and features of APT attacks in Korea that were identified over the course of a month in May 2025.   Figure 1. Statistics of APT attacks in

April 2025 Threat Trend Report on APT Attacks (South Korea)

April 2025 Threat Trend Report on APT Attacks (South Korea)

Overview   AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea using its own infrastructure. This report covers the classification, statistics, and functions of APT attacks detected in South Korea over the course of one month in April 2025.   Figure 1. Statistics of APT attacks in South

March 2025 APT Group Trends (South Korea)

March 2025 APT Group Trends (South Korea)

Overview   AhnLab is monitoring Advanced Persistent Threat (APT) attacks in South Korea using its own infrastructure. This report covers the classification, statistics, and features of the APT attacks in South Korea that were identified in March 2025, as well as the attack types.     Figure 1. Statistics of

ViperSoftX Malware Distributed by Arabic-Speaking Threat Actor

ViperSoftX Malware Distributed by Arabic-Speaking Threat Actor

AhnLab SEcurity intelligence Center (ASEC) uncovered that attackers, suspected to be Arabic speakers, have been distributing ViperSoftX malware targeting Korean victims since April 1, 2025. ViperSoftX is typically spread through cracked software or torrents, masquerading as legitimate programs. The main characteristic of ViperSoftX is that it operates as a PowerShell

Remcos RAT Malware Disguised as Major Carrier’s Waybill

Remcos RAT Malware Disguised as Major Carrier’s Waybill

AhnLab SEcurity intelligence Center (ASEC) has recently discovered the Remcos malware disguised as a waybill from a major shipping company. This article details the distribution distribution flow from HTML, JavaScript, and AutoIt scripts leading to the execution of the final Remcos malware.   Figure 1 shows the original email with

Warning Against Phishing Emails Distributing GuLoader Malware by Impersonating a Famous International Shipping Company

Warning Against Phishing Emails Distributing GuLoader Malware by Impersonating a Famous International Shipping Company

AhnLab SEcurity intelligence Center (ASEC) recently identified the distribution of GuLoader malware via a phishing email by impersonating a famous international shipping company. The phishing email was obtained through the email honeypot operated by ASEC. The mail body instructs users to check their post-paid customs tax and demands them to