The Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) has confirmed an advanced cyber attack against organizations in Japan, believed to have been conducted by the cyber espionage group APT-C-60.
The attackers used phishing techniques, masquerading as a job applicant to infiltrate the victim’s system and deploy advanced malware.
The attack began with a targeted phishing email sent to the recruitment contact point of the targeted organization.
The email contained a Google Drive link that, when accessed, led to the download of a malicious VHDX file (a virtual hard disk format).
Upon mounting the VHDX file, it revealed several components, including decoy documents and an LNK file titled “Self-Introduction.lnk.”
This shortcut file leveraged the legitimate executable file git.exe
to execute a script (IPML.txt).
The IPML.txt script performed multiple actions, such as:
This downloader subsequently communicated with the legitimate cloud services Bitbucket and StatCounter, highlighting the attackers’ strategy of abusing trusted platforms.
The downloader (SecureBootUEFI.dat) showcased the following behavior:
The Service.dat downloader continued the infection chain by retrieving two additional payloads (cbmp.txt and icon.txt) from another Bitbucket repository.
These files were decoded and saved as cn.dat and sp.dat, then deployed using further COM hijacking techniques.
The final payload, a backdoor malware known as SpyGrace (version 3.1.6), was deployed to give attackers continued access to the compromised system.
The malware demonstrates several sophisticated tactics, including checking network connectivity, executing malicious files within specific system directories, and employing advanced programming techniques, such as using the initterm function, to evade detection tools effectively.
This attack shares similarities with campaigns observed from August to September 2024, targeting organizations across Japan, South Korea, and China.
Reports from security vendors identified a pattern of abuse of legitimate services like Bitbucket and StatCounter, as well as persistence through COM hijacking.
Decoy documents found in the recycle bin of the VHDX file indicate the attackers tailored their phishing emails for these regions.
SOC and DFIR teams can collect the indicators of compromise at the bottom of the detailed technical report.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has been…
AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers, suspected…
AI has recently been added to the list of things that keep cybersecurity leaders awake.…
A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave over…
The threat actor known as GOFFEE has launched a series of targeted attacks against critical…
A Cisco’s Smart Install protocol (CVE-2018-0171), first patched in 2018, remains a pervasive threat to…