Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads

APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads

Posted on May 17, 2025May 17, 2025 By CWS

North Korean state-sponsored risk actor APT Group 123 has intensified its cyber espionage marketing campaign, particularly focusing on Home windows techniques throughout a number of sectors globally.

The group, energetic since at the very least 2012 and likewise tracked beneath aliases similar to APT37, Reaper, and ScarCruft, has traditionally targeted on South Korean targets however has expanded operations to Japan, Vietnam, the Center East, and different areas lately.

The subtle assaults primarily goal to extract delicate info from important sectors together with authorities, aerospace, manufacturing, and high-tech industries.

The risk actor’s main an infection vector entails extremely focused spear phishing emails containing malicious attachments that exploit vulnerabilities in widespread phrase processors, together with Microsoft Workplace purposes.

Moreover, the group conducts strategic internet compromises by way of watering gap assaults and drive-by downloads, exploiting vulnerabilities in internet browsers and plugins when customers go to compromised web sites.

These multi-faceted assault vectors display APT Group 123’s versatility in establishing preliminary entry to focus on networks.

Cyfirma researchers recognized that the affect of those assaults extends past info theft, with the group now participating in ransomware assaults for monetary acquire alongside their espionage operations.

This twin motivation displays an evolution of their ways, because the monetary proceeds seem to straight assist their broader intelligence-gathering mission.

The group’s persistent operations have affected organizations throughout at the very least 13 international locations, with a selected concentrate on entities possessing priceless mental property or strategic info.

Latest intelligence suggests APT Group 123 continues to refine its methods, incorporating newly disclosed vulnerabilities into their arsenal with exceptional pace.

The group leverages customized malware together with ROKRAT, PoohMilk, and Freenki Loader to determine persistent entry to compromised techniques.

As soon as inside a community, the attackers transfer laterally, escalate privileges, and exfiltrate delicate information to their command and management infrastructure, inflicting important operational and safety impacts for focused organizations.

Superior Protection Evasion Strategies

The subtle nature of APT Group 123’s operations is especially evident of their protection evasion methods.

The group employs encryption, particularly HTTPS, for command and management communications to mix malicious site visitors with authentic community exercise.

This strategy makes detection considerably tougher for conventional safety options. Their malware sometimes employs a multi-stage structure, with payloads break up throughout a number of elements to complicate evaluation and detection.

Assault circulate (Supply – Cyfirma)

The attackers display appreciable operational safety consciousness by implementing checks for safety and evaluation instruments inside their malware.

When such instruments are detected, the malicious code might alter its conduct to keep away from triggering alerts.

APT Group 123 often employs superior methods similar to DLL sideloading, the place authentic Home windows processes are manipulated to load malicious code, in addition to DLL hollowing and name stack spoofing to additional evade detection.

Maybe most regarding is the group’s evolving infrastructure technique. Cyfirma analysts famous that APT Group 123 more and more leverages compromised authentic internet servers and cloud-based platforms for his or her command and management operations.

Beforehand, they utilized providers like X, Yandex, and Mediafire, with current proof suggesting potential enlargement to mainstream providers like Google Drive.

This tactical shift represents a big problem for defenders because it additional obfuscates malicious community communications behind seemingly authentic site visitors patterns.

How SOC Groups Save Time and Effort with ANY.RUN – Dwell webinar for SOC groups and managers

Cyber Security News Tags:Actively, APT, Attacking, Deliver, Group, Malicious, Payloads, Systems, Windows

Post navigation

Previous Post: How to Protect Your Privacy on Social Media
Next Post: VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited

Related Posts

CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks Cyber Security News
Cybersecurity Industry Gains .7 Billion to Develop Cutting-Edge Protection Technologies Cybersecurity Industry Gains $1.7 Billion to Develop Cutting-Edge Protection Technologies Cyber Security News
12-Year-Old Sudo Linux Vulnerability Enables Privilege Escalation to Root User 12-Year-Old Sudo Linux Vulnerability Enables Privilege Escalation to Root User Cyber Security News
Threat Modeling for DevSecOps Practical Guide Threat Modeling for DevSecOps Practical Guide Cyber Security News
Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures Cyber Security News
Printer Company Offered Malicious Drivers Infected With XRed Malware Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News