APT-C-60, a cyber-espionage group with suspected links to South Korea, has escalated its long-running campaign targeting organizations in Japan. Between June and August 2025, the group was observed using updated versions of its signature backdoor, SpyGlace. The threat actor has refined its TTPs, moving from cloud-hosted malware downloads to direct email attachments and increasingly abusing legitimate public services like GitHub, StatCounter, and Git for command-and-control (C2) and malware staging. This evolution demonstrates the group's commitment to its objectives and its ability to adapt to bypass security measures, posing a persistent threat to Japanese entities.
The campaign continues to leverage social engineering, with attackers impersonating job seekers to entice targets in HR departments to open malicious files. This approach provides a reliable entry point into corporate networks. The primary goal of APT-C-60 appears to be intelligence gathering and long-term espionage.
The most significant evolution in their recent attacks is the abuse of legitimate, high-reputation services for malicious purposes. By using platforms like GitHub and StatCounter for C2, the attackers' traffic blends in with normal business activity, making it difficult for defenders to block without causing operational disruption.
Analysis by JPCERT/CC and Cyble reveals several key TTPs:
T1566.001 - Spearphishing Attachment.T1204.002 - Malicious File).T1105 - Ingress Tool Transfer). This technique is a form of Living off the Land, making detection based on network signatures challenging.The sustained and evolving nature of this campaign indicates a dedicated, long-term espionage effort against Japan. The potential impacts include:
M1017 - User Training).M1037 - Filter Network Traffic).M1038 - Execution Prevention).Educating HR and other departments about phishing attacks using uncommon attachments like VHDX files is a key preventative measure.
Filtering and monitoring outbound traffic to services like GitHub and StatCounter can help detect or block C2 communications.
Mapped D3FEND Techniques:
To counter APT-C-60's abuse of legitimate services like StatCounter and GitHub for C2, organizations in Japan must implement sophisticated network traffic analysis. Instead of blocking these essential services, focus on baselining normal activity and detecting anomalies. For example, monitor for connections to api.statcounter.com from servers or from any host that does not have a legitimate business reason to use web analytics. Similarly, analyze traffic to raw.githubusercontent.com to detect downloads of executables or scripts by non-developer systems. Alert on high-frequency, small, beacon-like connections to these domains, which are characteristic of C2 channels. This behavioral approach is crucial for detecting attackers who are 'living off the land'.
The initial access vector for this campaign is a malicious VHDX file. Your email security gateway should be configured to heavily scrutinize, quarantine, or block incoming emails with .vhdx attachments, as this is a highly unusual file type for business communication. On the endpoint, use an EDR solution to monitor for the mounting of VHDX images (*.vhdx). Create a detection rule that triggers an alert when a process is executed from a path corresponding to a newly mounted virtual disk. This allows security teams to investigate the initial stage of the infection chain before the SpyGlace backdoor can establish persistence.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats