Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

APT-C-60 (APT) – Threat Actor

February 16, 2025
Reading Time: 5 mins read
in APT, Threat Actors
APT-C-60 (APT) – Threat Actor

APT-C-60

Other Names

Psuedo Hunter

Location

South Korea

Date of Initial Activity

2021

Suspected Attribution 

APT

Motivation

Cyberwarfare
Espionage

Software

Windows

Overview

APT-C-60, a sophisticated and highly active threat group, has emerged as a prominent player in the realm of advanced persistent threats (APTs). First disclosed by domestic security vendors in 2021, this group is believed to have been operating since at least 2018, with a history of targeting key industries and geopolitical entities. APT-C-60 has been linked to a series of cyberattacks that have involved complex techniques and a clear focus on espionage and information theft. Its operations often target institutions involved in human resources, trade, and diplomacy, with notable activities in regions such as China and South Korea. The group’s attack methods are marked by precision and stealth, often leveraging spear-phishing campaigns to infiltrate high-profile targets. APT-C-60 has been known to use socially engineered emails to trick victims into downloading malicious payloads, which are typically hosted on public cloud platforms or private command-and-control (C&C) servers. These payloads include highly advanced malware designed to maintain persistent access, steal sensitive information, and facilitate further network exploitation. The group’s ability to operate undetected for extended periods, often through multiple stages of infection, is one of its most concerning features.

Common targets

Information

Individuals

Public Administration

China

South Korea

Attack Vectors

Phishing

Software Vulnerabilities

How they operate

One of the primary techniques used by APT-C-60 is spear-phishing, where they send highly targeted emails to specific individuals within organizations. These emails often contain malicious attachments or links, disguised as legitimate documents or communications. For example, during an attack on South Korean officials in 2022, APT-C-60 impersonated a Korean graduate student and sent an email that appeared to contain a thesis defense presentation. When the victim downloaded the attached file, it was a compressed RAR file that included a malicious LNK (shortcut) file designed to exploit vulnerabilities and execute malware upon opening. This demonstrates the group’s expertise in creating convincing social engineering tactics to lure victims into executing the malicious payload. Once the victim opens the malicious file, the malware begins its execution process. The LNK file serves as a downloader, which calls the mshta command to execute remote JavaScript. This JavaScript is obfuscated to evade detection and contains code that downloads further malicious resources from the C&C server. The malware is then decrypted and stored on the victim’s system, typically in a hidden directory within the user’s AppData folder. APT-C-60 uses a file named mssysmon.db, which acts as a persistent downloader Trojan, allowing the group to maintain access to the compromised machine. This persistence is achieved by manipulating Windows’ scheduled tasks, leveraging a COM object tied to the “shared task scheduler” service to ensure that the Trojan remains active even after system reboots. The downloaded payload, mssysmon.db, is a DLL file that provides the core functionality for the malware. The Trojan’s primary role is to facilitate further exploitation, including information gathering, file stealing, and additional malware delivery. It achieves this by creating a unique event object to ensure that only one instance of the Trojan runs at a time. The malware then communicates with the C&C server at regular intervals, typically every six hours, to receive further instructions and download additional malicious files. These files are often stored in various formats, such as .dib or .bmp, which are commonly used by APT-C-60 to evade detection mechanisms that might flag other file types. APT-C-60 also employs sophisticated obfuscation techniques to hide its presence on the infected machine. For example, the group uses encrypted configurations to store C&C server URLs, ensuring that the malware can continue to operate even if some communication channels are blocked or disrupted. These encrypted configurations also include other critical information, such as heartbeat intervals and potential fallback C&C addresses. By using legitimate cloud services like Bitbucket and StatCounter for hosting its malicious payloads, APT-C-60 further complicates detection efforts, as these services are often trusted by security systems. In addition to these techniques, APT-C-60 also utilizes advanced malware to steal sensitive information and enable long-term surveillance of its victims. The remote-control Trojan, TaskControler.dll, is designed to provide the group with full control over the infected system. This malware is capable of performing a wide range of activities, such as loading additional plugins, executing commands, and capturing data from the compromised machine. The group’s ability to perform file theft and other espionage-related tasks without being detected highlights the depth of their technical capabilities. The operational security of APT-C-60 is also noteworthy. By using a combination of legitimate and private infrastructure for payload hosting and C&C communication, the group is able to stay under the radar of traditional cybersecurity measures. Their use of cloud-based storage services, paired with their ability to rapidly change or delete malicious files after use, allows them to operate in a stealthy manner and significantly reduces the chances of detection. APT-C-60’s technical operations reflect a high level of sophistication and adaptability. Through a combination of well-crafted spear-phishing attacks, multi-stage malware deployment, and clever use of cloud infrastructure, the group has been able to target high-profile individuals and organizations with significant success. Their advanced evasion techniques and persistent exploitation methods make them a formidable threat. To defend against APT-C-60, organizations must adopt proactive cybersecurity measures, including advanced phishing detection, comprehensive endpoint protection, and real-time monitoring of network traffic for signs of unusual activity. Understanding the technical operations of APT-C-60 is crucial for developing effective countermeasures and mitigating the risk posed by this persistent threat actor.  
References:
  • South Korea’s “Pseudo Hunter” APT organization uses multiple domestic software vulnerabilities to attack China
  • Analysis of APT-C-60 Attack on South Korea
Tags: APTAPT-C-60ChinaPsuedo HunterSouth KoreaThreat ActorsVulnerabilitiesWindows
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

FBI Warns Hedera NFT Airdrop Crypto Scam

New Chaos RAT Variant Hits Windows and Linux

UNC6040 Vishing Group Target Salesforce Data

Subscribe to our newsletter

    Latest Incidents

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    KiranaPro Startup Hacked All Data Wiped

    Nervos Bridge Paused After $3.9 Million Hack

    Ukraine GUR Claims Tupolev Data Theft Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial