Sunday, June 15, 2025
Advertisements

APT Group 123 Launches Global Cyber Attacks on Windows Systems

by Charline

May 19, 2025 — North Korean state-sponsored hackers, known as APT Group 123, have stepped up their cyber espionage efforts, focusing on Windows-based systems in various industries around the world.

Also known as APT37, Reaper, and ScarCruft, the group has been active since at least 2012. While it initially targeted South Korea, it has since expanded its reach to Japan, Vietnam, the Middle East, and other regions.

Advertisements

The group’s main goal is to steal sensitive data from critical sectors, including government, aerospace, manufacturing, and high-tech industries.

Advertisements

Attack Methods

APT Group 123 uses several attack methods. The most common is spear phishing. Hackers send targeted emails with malicious attachments that exploit weaknesses in Microsoft Office and similar programs.

Advertisements

They also use watering hole attacks and drive-by downloads. These tactics infect users when they visit compromised websites, taking advantage of browser and plugin vulnerabilities.

Advertisements

These techniques help the group gain initial access to networks and show their ability to adapt to different environments.

Shifting Tactics and Financial Motivation

According to researchers at cybersecurity firm Cyfirma, APT Group 123 is now combining espionage with financial crime. The group has started using ransomware attacks to generate income, which appears to fund its spying activities.

The group has affected organizations in at least 13 countries, often targeting those with valuable intellectual property or strategic data.

Advanced Malware and Network Infiltration

APT Group 123 uses custom malware tools such as ROKRAT, PoohMilk, and Freenki Loader. These tools help attackers stay inside networks undetected.

Once inside, they move through systems, increase their access, and send stolen data back to their servers. This can cause serious damage to both operations and security.

Evading Detection

The group uses encrypted communication, such as HTTPS, to hide their activity among regular network traffic. This makes it harder for traditional security tools to spot them.

Their malware often uses multiple stages and spreads the payload across different components. This makes analysis and detection more difficult.

The attackers are also aware of security tools. Their malware checks for such tools and changes its behavior to avoid raising alarms.

They commonly use advanced methods like DLL sideloading, DLL hollowing, and call stack spoofing to hide malicious code inside legitimate Windows processes.

Using Legitimate Platforms to Avoid Detection

Analysts have found that APT Group 123 is increasingly using legitimate web servers and cloud platforms for command and control operations. This includes services like X, Yandex, Mediafire, and possibly Google Drive.

This change makes it even harder for defenders to identify threats, as malicious activity is hidden behind normal-looking internet traffic.

Security experts warn that the group continues to evolve quickly, using new software vulnerabilities soon after they are discovered.

Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com