A new cyber-espionage campaign, dubbed Operation Silk Lure, is actively targeting Chinese-speaking professionals within the FinTech, cryptocurrency exchange, and digital trading sectors.
The attackers employ social engineering through fake Chinese-language résumés that deliver malicious .LNK files disguised as legitimate job applications. Once opened, these shortcuts execute scripts that deploy the ValleyRAT backdoor, granting attackers persistent access, surveillance capabilities, and data exfiltration functionality.
The campaign’s hallmark is its localized deception — using authentic Chinese-language details, such as references to South China Agricultural University and roles in Guangdong-based DeFi firms, to lure victims. The attack blends linguistic authenticity, technical sophistication, and targeted social engineering, turning a routine hiring interaction into a highly effective cyber intrusion.
The ValleyRAT malware campaign begins with weaponized emails containing .LNK shortcuts embedded in compressed archives or document attachments. When the victim opens the file, the shortcut executes keytool.exe, a self-extracting loader that decrypts and runs embedded shellcode via RC4 encryption.
This chain ultimately loads ValleyRAT, which performs:
The decoy PDF, posing as the résumé of “Li Hanbing,” a blockchain engineer, strengthens credibility by featuring fluent Simplified Chinese and legitimate industry experience, maximizing infection success among Chinese-language targets.
The attackers’ approach demonstrates hybrid tactics: human deception coupled with modular malware deployment, marking Operation Silk Lure as a sophisticated and persistent threat to Asia’s financial and crypto sectors.
Type | Value |
---|---|
MD5 | 6ea9555f1874d13246726579263161e8, f5b9ad341ccfe06352b8818b90b2413e, 83b341a1caab40ad1e7adb9fb4a8b911, 3ca440a3f4800090ee691e037a9ce501, e94e7b953e67cc7f080b83d3a1cdcb1f |
SHA256 | 190d493255c71f3cebb968c197aeef67c62d597b488c4a0b8cd77751e5999b94, ae857addc8eb51dbfa7d0a76b19dae7a6f275f7bf1042d1c982aca4f80ce635e, 158f2617bd2780ce4f1285f8b520a1407f5383e04eed259d014724b0cc4d76eb, 3f7819debdca5df5a6cd50147b51bceba12c5e0f8a6961b1612777080496dde1, 367c0bbc72b885e313f6731e98c7e4fa2d95c3cadb76e642a8492f8b12b3d9de |
IPv4 | 206[.]119[.]175[.]65, 206[.]119[.]175[.]178 |
Tactic | Technique ID | Technique Description |
---|---|---|
Initial Access | T1566 / T1566.001 | Phishing and spear-phishing attachments |
Execution | T1059 / T1204.002 | Command scripting and malicious file execution |
Persistence | T1053.005 / T1547.001 | Scheduled tasks and registry run keys |
Privilege Escalation | T1055 / T1068 | Process injection and privilege abuse |
Defense Evasion | T1027 / T1036 / T1497 | Obfuscation, masquerading, and sandbox evasion |
Credential Access | T1056 / T1555 | Keylogging and credential extraction |
Collection | T1113 / T1083 / T1005 | Screen capture and local file discovery |
Exfiltration | T1041 / T1071.001 | Exfiltration over web protocols |
Command & Control | T1071 / T1047 | C2 via HTTP/HTTPS and WMI |
SEO Keywords: Operation Silk Lure, ValleyRAT malware, FinTech phishing campaign, cryptocurrency cyber attack, Chinese-language spear-phishing, malicious LNK files, job-themed malware, RC4 decryption loader, SONDERCLOUDLIMITED C2 domains, DLL hijacking, Windows persistence malware, keylogging and exfiltration attacks.
Get through updates and upcoming events, and more directly in your inbox