Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages

Posted on July 17, 2025July 18, 2025 By CWS

A complicated espionage marketing campaign focusing on a number of Asian jurisdictions has emerged, using weaponized shortcut information and misleading social engineering methods to infiltrate high-value targets throughout China, Hong Kong, and Pakistan.

The risk actor, designated UNG0002 (Unknown Group 0002), has demonstrated exceptional persistence and technical evolution all through two main operational phases spanning from Could 2024 to the current.

The malicious marketing campaign employs a multi-stage an infection chain starting with weaponized LNK information embedded inside CV-themed decoy paperwork, progressing via VBScript execution, batch processing, and culminating in PowerShell-based payload deployment.

This subtle method permits the risk actors to bypass conventional safety measures whereas sustaining a low detection profile all through the an infection course of.

Seqrite analysts recognized that UNG0002 has considerably developed their techniques throughout Operation AmberMist, their most up-to-date marketing campaign working from January 2025 to Could 2025.

The risk group has expanded their focusing on past conventional protection and civil aviation sectors to incorporate gaming corporations, software program improvement companies, and tutorial establishments, indicating a broader intelligence assortment mandate.

Assault chain (Supply – Seqrite)

The marketing campaign’s most notable innovation includes the abuse of the ClickFix method, a social engineering methodology that presents victims with faux CAPTCHA verification pages designed to trick them into executing malicious PowerShell scripts.

Safety researchers have noticed situations the place the risk actors particularly spoofed Pakistan’s Ministry of Maritime Affairs web site to reinforce the legitimacy of their misleading pages.

Superior An infection Mechanism and Persistence Ways

The an infection mechanism demonstrates exceptional sophistication via its multi-layered method to system compromise.

The assault begins when victims obtain CV-themed ZIP archives containing malicious LNK information disguised as respectable PDF paperwork. Upon execution, these shortcut information provoke a posh chain involving VBScript interpretation, batch script processing, and PowerShell execution.

Persistent Infrastructure (Supply – Seqrite)

Technical evaluation reveals that UNG0002 employs DLL sideloading methods, notably focusing on respectable Home windows functions resembling Rasphone.exe and Node-Webkit binaries.

The malware leverages these trusted processes to execute malicious payloads whereas evading detection mechanisms.

Program Database (PDB) paths found throughout evaluation point out inner code names “Mustang” and “ShockWave,” suggesting organized improvement practices with C:UsersThe FreelancersourcereposJAN25mustangx64Releasemustang.pdb and C:UsersShockwavesourcereposmemcomx64Releasememcom.pdb paths embedded inside Shadow RAT and INET RAT respectively.

The persistent infrastructure maintains constant command and management operations, deploying customized implants together with Shadow RAT, INET RAT, and Blister DLL loaders.

These instruments present complete system entry, enabling knowledge exfiltration, distant command execution, and lateral motion capabilities throughout compromised networks, establishing UNG0002 as a formidable risk to regional cybersecurity.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Actors, CAPTCHA, ClickFix, Deploys, Fake, Files, LNK, Pages, UNG0002, Verification, Weaponize

Post navigation

Previous Post: Armenian Hacker Extradited to U.S. After Ransomware Attacks on Tech Firms
Next Post: Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data

Related Posts

Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network Cyber Security News
Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data Cyber Security News
Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection Cyber Security News
DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats Cyber Security News
Washington Post Journalists’ Microsoft Accounts Hacked in Targetetd Cyberattack Cyber Security News
Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Prevent SIM Swap Attacks
  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Prevent SIM Swap Attacks
  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News