Operation HanKook Phantom: Spear-Phishing Campaign
Aug. 29, 2025, 3:49 p.m.
Description
APT37, a North Korean state-backed cyber espionage group, has launched a sophisticated spear-phishing campaign targeting South Korean government sectors, research institutions, and academics. The attackers use malicious LNK files disguised as legitimate documents to deliver a multi-stage infection chain. This includes fileless PowerShell execution, in-memory loading of encrypted payloads, and covert data exfiltration mechanisms. The campaign, dubbed Operation HanKook Phantom, demonstrates APT37's continued focus on intelligence gathering and long-term espionage against South Korean targets. The attackers leverage cloud services for command-and-control and employ various techniques to evade detection, highlighting the persistent threat posed by North Korean state-sponsored actors.
External References
Tags
Date
- Created: Aug. 29, 2025, 1:41 p.m.
- Published: Aug. 29, 2025, 1:41 p.m.
- Modified: Aug. 29, 2025, 3:49 p.m.
Additional Informations
- Defense
- Education
- Government
- British Indian Ocean Territory
- Kuwait
- Nepal
- India
- China
- Japan
- Romania
- Russian Federation