Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files

Posted on July 25, 2025July 25, 2025 By CWS

Jul 25, 2025Ravie LakshmananMalware / Risk Intelligence
The risk actor referred to as Patchwork has been attributed to a brand new spear-phishing marketing campaign focusing on Turkish protection contractors with the purpose of gathering strategic intelligence.
“The marketing campaign employs a five-stage execution chain delivered by way of malicious LNK information disguised as convention invites despatched to targets fascinated with studying extra about unmanned car programs,” Arctic Wolf Labs stated in a technical report revealed this week.
The exercise, which additionally singled out an unnamed producer of precision-guided missile programs, seems to be geopolitically motivated because the timing coincides amid deepening protection cooperation between Pakistan and Türkiye, and the current India-Pakistan army skirmishes.

Patchwork, additionally referred to as APT-C-09, APT-Q-36, Chinastrats, Dropping Elephant, Operation Hangover, Quilted Tiger, and Zinc Emerson, is assessed to be a state-sponsored actor of Indian origin. Recognized to be energetic since no less than 2009, the hacking group has a observe file of placing entities in China, Pakistan, and different international locations in South Asia.

Precisely a 12 months in the past, the Knownsec 404 Crew documented Patchwork’s focusing on entities with ties to Bhutan to ship the Brute Ratel C4 framework and an up to date model of a backdoor referred to as PGoShell.
For the reason that begin of 2025, the risk actor has been linked to numerous campaigns aimed toward Chinese language universities, with current assaults utilizing baits associated to energy grids within the nation to ship a Rust-based loader that, in flip, decrypts and launches a C# trojan referred to as Protego to reap a variety of knowledge from compromised Home windows programs.
One other report revealed by Chinese language cybersecurity agency QiAnXin again in Could stated it recognized infrastructure overlaps between Patchwork and DoNot Crew (aka APT-Q-38 or Bellyworm), suggesting potential operational connections between the 2 risk clusters.

The focusing on of Türkiye by the hacking group factors to an enlargement of its focusing on footprint, utilizing malicious Home windows shortcut (LNK) information distributed by way of phishing emails as a place to begin to kick-off the multi-stage an infection course of.

Particularly, the LNK file is designed to invoke PowerShell instructions which might be accountable for fetching extra payloads from an exterior server (“expouav[.]org”), a website created on June 25, 2025, that hosts a PDF lure mimicking a global convention on unmanned car programs, particulars of that are hosted on the reputable waset[.]org web site.
“The PDF doc serves as a visible decoy, designed to distract the consumer whereas the remainder of the execution chain runs silently within the background,” Arctic Wolf stated. “This focusing on happens as Türkiye instructions 65% of the worldwide UAV export market and develops vital hypersonic missile capabilities, whereas concurrently strengthening protection ties with Pakistan throughout a interval of heightened India-Pakistan tensions.”

Among the many downloaded artifacts is a malicious DLL that is launched utilizing DLL side-loading via a scheduled process, in the end resulting in the execution of shellcode that carries out intensive reconnaissance of the compromised host, together with taking screenshots, and exfiltrating the small print again to the server.
“This represents a big evolution of this risk actor’s capabilities, transitioning from the x64 DLL variants noticed in November 2024, to the present x86 PE executables with enhanced command buildings,” the corporate stated. “Dropping Elephant demonstrates continued operational funding and improvement by architectural diversification from x64 DLL to x86 PE codecs, and enhanced C2 protocol implementation by impersonation of reputable web sites.”

The Hacker News Tags:Defense, Files, Firms, LNK, Malicious, Patchwork, SpearPhishing, Targets, Turkish

Post navigation

Previous Post: 15 Best Bandwidth Monitoring Tools in 2025
Next Post: U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Related Posts

Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors The Hacker News
Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play The Hacker News
FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign The Hacker News
U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems The Hacker News
Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection The Hacker News
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
  • Infamous BreachForums Is Back Online With All Accounts and Posts Restored
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
  • Infamous BreachForums Is Back Online With All Accounts and Posts Restored
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News