Cyber Espionage Comedy: APT-C-60’s Job Application Prank on Japan
APT-C-60 strikes again, targeting Japan with a sneaky job application-themed cyber attack. Using phishing emails and virtual disk tricks, this South Korea-aligned group delivered the SpyGlace backdoor. They even employed legitimate tools like Google Drive. APT-C-60 sure knows how to make malware delivery look like a job application.

Hot Take:
Look out, Japan! It seems APT-C-60 has rolled out the red carpet for their latest cyber espionage thriller. With a phishing email that screams “Hire me, please,” they’ve slipped their SpyGlace malware past the front desk and into the back office. The twist? It’s all done with a dash of Google Drive, a sprinkle of Bitbucket, and a helping of StatCounter. Who knew job applications could be this dangerous? Looks like it’s time to update that resume and your cybersecurity protocols!
Key Points:
- APT-C-60, a South Korea-aligned group, attacked a Japanese organization using a job application-themed lure.
- The attack utilized legitimate services like Google Drive, Bitbucket, and StatCounter for malware delivery.
- Phishing emails linked to a VHDX file initiated the infection chain with a decoy document.
- SpyGlace backdoor was employed to communicate with a command-and-control server for further instructions.
- Other cybersecurity firms have noted similar campaigns by APT-C-60 and related groups.