A South Korea-aligned threat actor, APT-C-60, has been linked to a cyber espionage attack targeting an unnamed organization in Japan. The attackers used a job application-themed phishing email to deliver the SpyGlace backdoor, exploiting legitimate services like Google Drive, Bitbucket, and StatCounter.
The attack, which occurred in August 2024, is part of a broader trend of cyberattacks leveraging innovative methods to evade detection, as reported by JPCERT/CC.
Attack Chain Details
The attack began with a phishing email masquerading as a job applicant. It contained a link to a file hosted on Google Drive, which led to the download of a VHDX file. Once mounted, the file included:
The LNK file triggered a series of steps in the infection chain, displaying the decoy document as a distraction while deploying a downloader payload named SecureBootUEFI.dat.
Techniques and Tools Used
Broader Connections
The attack exploited a remote code execution (RCE) vulnerability in WPS Office for Windows (CVE-2024-7262). The campaign aligns with previous observations of APT-C-60 activity and hints at links with other sub-groups like APT-Q-12 (Pseudo Hunter) within the DarkHotel cluster.
Positive Technologies noted that attackers from Asia are increasingly using virtual disks (VHD/VHDX) to bypass protective mechanisms, a non-standard yet effective delivery method.
Mitigation Recommendations
To defend against attacks like these:
This attack highlights the sophistication and persistence of regional threat groups like APT-C-60, leveraging legitimate services and advanced techniques to bypass defenses. Organizations should prioritize comprehensive cybersecurity measures to stay resilient against evolving threats.
© 2016 - 2025 Red Secure Tech Ltd. Registered in England and Wales under Company Number: 15581067