Saturday, February 14, 2026

Leveraging Weaponized LNK Files and Tools like Cobalt Strike and Metasploit in Targeted Cyberattacks on Organizations

Cybersecurity researchers at Seqrite Labs have identified and tracked a sophisticated espionage group known as UNG0002, which has been conducting targeted cyberattacks across multiple Asian jurisdictions, including China, Hong Kong, and Pakistan, since May 2024.

The threat actor demonstrates advanced technical capabilities while maintaining consistent operational patterns across two major campaigns: Operation Cobalt Whisper and the more recent Operation AmberMist.

Advanced Multi-Stage Attack Methodology

UNG0002 employs a sophisticated infection chain beginning with weaponized shortcut files (LNK) embedded within CV-themed decoy documents.

The attack progression follows a deliberate sequence: malicious LNK files execute VBScript code, which then triggers batch scripts and PowerShell commands to deploy custom Remote Access Trojans (RATs).

The group has evolved from primarily using established frameworks, such as Cobalt Strike and Metasploit, to developing custom implants, including Shadow RAT, INET RAT, and Blister DLL.

Technical analysis reveals telling artifacts in the malware’s Program Database (PDB) paths, such as “C:\Users\The Freelancer\source\repos\JAN25\mustang\x64\Release\mustang.pdb” for Shadow RAT, indicating potential code names that may reference other known threat groups.

This suggests the actors deliberately mimic techniques from established threat actor playbooks to complicate attribution efforts.

Innovative Social Engineering and Evasion Techniques

The threat group has demonstrated significant innovation in social engineering tactics, notably implementing the ClickFix technique during Operation AmberMist.

This method involves creating fake CAPTCHA verification pages that trick victims into executing malicious PowerShell scripts, including instances where they spoofed Pakistan’s Ministry of Maritime Affairs website.

UNG0002 consistently abuses DLL sideloading techniques, leveraging legitimate Windows applications such as Rasphone and Node-Webkit binaries to execute malicious payloads while evading detection systems.

The group maintains persistent command and control infrastructure with consistent naming patterns, demonstrating sophisticated operational security across campaigns spanning over a year.

Their targeting strategy focuses systematically on high-value sectors including defense, electrotechnical engineering, civil aviation, gaming, software development, and academic institutions.

The use of realistic resume documents featuring fake profiles of game UI designers and computer science students from prestigious institutions shows careful reconnaissance and social engineering preparation.

Attribution and Future Implications

Seqrite Labs assesses with high confidence that UNG0002 originates from South-East Asia and focuses primarily on espionage activities.

The group’s evolution from Operation Cobalt Whisper’s 20 observed infection chains targeting defense and engineering sectors to Operation AmberMist’s expanded focus on gaming and software development indicates growing operational scope and technical sophistication.

The threat actor’s adaptability and persistent infrastructure maintenance suggest continued evolution of their capabilities, warranting ongoing monitoring by cybersecurity professionals across targeted regions and industries.

IOCs

  • Non-PE [Script-Based Files, Shortcut, C2-Config, Encrypted Shellcode blobs]
File TypeHash (SHA-256)
LNK (Shortcut)4ca4f673e4389a352854f5feb0793dac43519ade8049b5dd9356d0cbe0f06148
55dc772d1b59c387b5f33428d5167437dc2d6e2423765f4080ee3b6a04947ae9
4b410c47465359ef40d470c9286fb980e656698c4ee4d969c86c84fbd012af0d
SCT (Scriptlet)c49e9b556d271a853449ec915e4a929f5fa7ae04da4dc714c220ed0d703a36f7
VBS (VBScript)ad97b1c79735b1b97c4c4432cacac2fce6316889eafb41a0d97f2b0e565ee850
c722651d72c47e224007c2111e0489a028521ccdf5331c92e6cd9cfe07076918
2140adec9cde046b35634e93b83da4cc9a8aa0a71c21e32ba1dce2742314e8dc

Recent News

Recent News