Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Warns: Hackers Use AI to Create Zero- Using Working
May 11, 2026
Go Library fsnotify: Supply Chain Alarms After Access Changes
May 11, 2026
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Home/Threats/Chollima APT Uses LNK File to Deploy Sophisticated
Threats

Chollima APT Uses LNK File to Deploy Sophisticated

Since March 2025, the Ricochet Chollima advanced persistent threat group has launched a targeted campaign against activists and organizations focused on North Korea. The operation, named “Operation:...

Sarah simpson
Sarah simpson
February 3, 2026 2 Min Read
3 0

Since March 2025, the Ricochet Chollima advanced persistent threat group has launched a targeted campaign against activists and organizations focused on North Korea.

The operation, named “Operation: ToyBox Story” by Genians Security Center, relies on a clever combination of social engineering and malware delivery tactics.

Attackers send spear-phishing emails that appear to come from credible sources, specifically impersonating North Korea-focused security experts.

These emails contain Dropbox links that lead to compressed archives holding malicious Windows shortcut files. The victims unknowingly download files that trigger hidden code execution when opened.

The attack demonstrates significant sophistication in disguising malicious content. Threat actors crafted emails with subject lines referencing North Korean troops deployed to Russia, using culturally relevant content to increase the likelihood of user engagement.

The email attachments mimic Hangul document icons—commonly associated with legitimate Korean word processors—to deceive recipients into thinking they are opening standard documents rather than executable files.

Operation. ToyBox Story (Source - Medium)
Operation. ToyBox Story (Source – Medium)

This social engineering approach proves effective because users trust familiar file icons and organizations they believe are sending the messages.

An Offensive Security Engineer, S3N4T0R, noted the malware after analyzing the campaign’s technical characteristics and infection chain.

S3N4T0R identified how the attack progresses through multiple stages, each designed to evade security tools and maintain persistence on compromised systems.

The analysis revealed that attackers deliberately structured the malware to stay hidden in system memory rather than writing files to disk.

Fileless Execution Through Memory Injection

The most dangerous aspect of this malware involves its ability to execute code without leaving traces on the hard drive.

When victims extract the ZIP archive and open the seemingly innocent document file, a hidden PowerShell command embedded within the shortcut executes silently.

This command launches a batch file named “toy03.bat,” which then loads a file called “toy02.dat” from the temporary folder.

Toy.bat (Source – Medium)

The loader decodes XOR-transformed data and injects shellcode directly into memory, bypassing traditional file-based detection methods.

Once loaded into memory, the malware creates a new executable thread to run the injected code.

This technique, known as fileless malware execution, presents serious challenges for security teams because the malicious program leaves minimal evidence on disk.

The malware then establishes communication through Dropbox API channels, allowing attackers to send commands and receive stolen data while hiding their activities within legitimate cloud service traffic.

This approach represents a significant evolution in APT tactics, leveraging trusted services to conceal malicious operations and making detection substantially more difficult for defenders.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Critical Apache Syncope Vulnerability Hijacks User

Next Post

Malicious Party Invites Trick Users into Installing RATs

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
ShinyHunters Breaches Instructure Canvas LMS Free-
May 11, 2026
Hugging Face Repo with 200k Downloads Inst Trending Repository
May 11, 2026
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us