Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Allianz Life says “majority” of customer personal data stolen in a cyber attack

Tesla wants to bring Robotaxis to San Francisco. This is what gets in the way.

Meta name Shengjia Zhao as Chief Scientist of AI Superintelligence Unit

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Patchwork targets Turkish defense companies with spear phishing using malicious LNK files
Identity

Patchwork targets Turkish defense companies with spear phishing using malicious LNK files

userBy userJuly 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 25th, 2025Ravi LakshmananMalware/Threat Intelligence

Spear phishing using malicious LNK files

The threat actor, known as Patchwork, is attributed to a new spear phishing campaign targeting Turkish defense contractors with the goal of gathering strategic information.

“The campaign employs a five-stage execution chain delivered via malicious LNK files disguised as a meeting invitation sent to targets interested in learning more about unmanned vehicle systems,” Arctic Wolf Labs said in a technical report released this week.

The action of selecting an unknown manufacturer of precision guided missile systems also appears geopolitical motivated by its timing coincidence in deepening defence cooperation between Pakistan, Churkiye and the recent skirmish between India-Pakistani military.

Also known as APT-C-09, APT-Q-36, Chinastrats, Dropping Elephant, Operation Hangover, Quilted Tiger, and Zinc Emerson, the patchwork is rated as a state-sponsored actor of Indian origin. Hacking groups known to have been active since at least 2009 have a track record of impressive organizations in China, Pakistan and other countries in South Asia.

Cybersecurity

Just a year ago, the known Sec 404 team provided an updated version of the patchwork targeting entity with a link to Blue Tan with a Blue Tratel C4 framework and a backdoor called Pgoshell.

Since its launch in 2025, threat actors have been linked to various campaigns targeting Chinese universities, with recent attacks using bait associated with domestic power grids to supply bait to provide rusty loaders and launch C# Trojan called Protego to harvest a wide range of information from a reduced windows system.

Another report released in May by Chinese cybersecurity firm Qianxin identifies infrastructure overlap between Patchwork and the DONOT team (aka APT-Q-38 or ventricularis), suggesting potential operational ties between the two threat clusters.

Targeting Türkiye by hacking groups points to an extension of the targeting footprint using malicious Windows Shortcuts (LNK) files distributed via phishing emails as a starting point for kicking off the multi-stage infection process.

Specifically, the LNK file is designed to invoke PowerShell commands that are responsible for getting additional payloads from external servers (“expouav[.]org”), the domain created on June 25, 2025, hosts PDF lures mimicking the international conference on unmanned vehicle systems.[.]ORG website.

“The PDF document acts as a visual decoy and is designed to distract the user, with the rest of the execution chain running quietly in the background,” says Arctic Wolf. “This targeting will occur as Türkiye commands 65% of the global UAV export market, developing key Hi-sonic missile capabilities, while strengthening defence ties with Pakistan during periods of rising tensions between India and Pakistan.”

Cybersecurity

Among the downloaded artifacts are malicious DLLs launched using DLL sideloads using scheduled tasks, which ultimately lead to the execution of shellcode that performs extensive reconnaissance of compromised hosts, such as taking screenshots and returning details to the server.

“This represents a significant evolution of this threat actor’s ability to migrate from the X64 DLL variant observed in November 2024 to the current X86 PE executable with enhanced command structure,” the company said. “Elephant Drops demonstrate continued operational investment and development through architectural diversification from X64 DLL to X86 PE formats, enhancing the implementation of the C2 protocol through legitimate website impersonation.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMeta will stop selling political ads in the EU from October
Next Article Apple expands the App Store age system
user
  • Website

Related Posts

N. The US sanctions company behind the Korean IT scheme. Arizona woman was jailed to run a laptop farm

July 25, 2025

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

July 25, 2025

SOCO404 and Koske malware target cloud services with cross-platform encryption attacks

July 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Allianz Life says “majority” of customer personal data stolen in a cyber attack

Tesla wants to bring Robotaxis to San Francisco. This is what gets in the way.

Meta name Shengjia Zhao as Chief Scientist of AI Superintelligence Unit

Sam Altman warns that ChatGpt is not legally confidential when using it as a therapist

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.