Patchwork Phish Frenzy: Turkish Defense Contractors Caught in Cyber Crosshairs!
Patchwork, the notorious threat actor with more aliases than a secret agent, is back. They’ve launched a spear-phishing campaign against Turkish defense contractors, hoping to collect strategic intelligence. Don’t be fooled by their LNK files masquerading as conference invites. It’s nothing but a digital Trojan horse with a twist of geopolitical intrigue!

Hot Take:
Patchwork is weaving a new tapestry of cyber espionage, and this time they’ve set their sights on Turkish defense contractors. Maybe they think it’s time to add some Turkish delight to their collection of geopolitical intrigues. These cyber sneak thieves are sending out invites to unmanned vehicle conferences, but it’s far from a social gathering – unless you count the gathering of intelligence, that is!
Key Points:
- Patchwork, an Indian-origin state-sponsored actor, targets Turkish defense contractors with spear-phishing.
- The attack uses LNK files disguised as conference invites, leading to a multi-stage infection process.
- The campaign’s timing aligns with increased defense cooperation between Pakistan and Türkiye.
- Patchwork’s methods have evolved, moving from x64 DLLs to x86 PE executables.
- Infrastructure overlaps suggest potential ties between Patchwork and DoNot Team.