Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Operation Hanoi Thief: Vietnam APT

0
Medium
Published: Fri Nov 28 2025 (11/28/2025, 14:06:46 UTC)
Source: AlienVault OTX General

Description

Operation Hanoi Thief is a spear-phishing campaign targeting Vietnamese IT professionals and recruitment teams. It uses malicious ZIP files containing fake resumes and LNK files that execute a pseudo-polyglot payload. This payload deploys a C++ DLL implant named LOTUSHARVEST via DLL sideloading, which steals browser credentials and history. The stolen data is exfiltrated to attacker-controlled servers. The campaign uses anti-analysis techniques and abuses trusted Windows tools to evade detection. While it shares similarities with Chinese-origin campaigns, state sponsorship is not confirmed. The attack primarily affects Vietnam's IT and recruitment sectors, with no known exploits in the wild beyond spear-phishing. The campaign poses a medium severity threat due to its targeted nature and credential theft capabilities. European organizations are not directly targeted but could be at risk if similar tactics spread. Mitigation requires focused user training, monitoring for DLL sideloading, and blocking known indicators of compromise.

AI-Powered Analysis

AILast updated: 11/28/2025, 19:08:54 UTC

Technical Analysis

Operation Hanoi Thief is a targeted spear-phishing campaign aimed at Vietnamese IT professionals and recruitment personnel. The attack vector involves sending malicious ZIP archives containing a fake resume and an LNK file. When the LNK file is opened, it executes a pseudo-polyglot payload that leverages DLL sideloading to deploy a C++ DLL implant called LOTUSHARVEST. This implant functions as an information stealer, primarily harvesting browser credentials and browsing history from infected systems. The stolen data is then exfiltrated to attacker-controlled domains such as eol4hkm8mfoeevs.m.pipedream.net and uuhlswlx.requestrepo.com. The campaign employs multiple anti-analysis techniques to evade detection and abuses trusted Windows utilities to blend in with normal system activity. Although there are similarities to previous Chinese-origin APT campaigns, definitive attribution to a nation-state actor remains inconclusive. The campaign focuses on the Information Technology and Recruitment sectors within Vietnam, exploiting the trust and interest in job applications to lure victims. The attack chain involves techniques mapped to MITRE ATT&CK such as spear-phishing attachments (T1566.001), DLL sideloading (T1574.002), credential dumping (T1555.003), and data exfiltration (T1041). No CVEs or known exploits in the wild are associated with this campaign, indicating it relies on social engineering and living-off-the-land tactics rather than software vulnerabilities. The medium severity rating reflects the targeted nature and potential for credential compromise, which could lead to further network intrusion or espionage.

Potential Impact

For European organizations, the direct impact of Operation Hanoi Thief is currently limited due to its focus on Vietnamese IT and recruitment sectors. However, the tactics used—such as spear-phishing with malicious LNK files, DLL sideloading, and information stealing—are common in APT campaigns and could be adapted or replicated against European targets. If threat actors behind this campaign expand their targeting or share tools and techniques, European IT and recruitment sectors could face similar risks, including credential theft leading to unauthorized access, lateral movement, and data breaches. The exfiltration of browser credentials and history can compromise user accounts and sensitive information, potentially affecting confidentiality and integrity. The use of trusted Windows tools and anti-analysis techniques complicates detection and response, increasing the risk of prolonged undetected presence. Organizations with significant interactions or partnerships with Vietnamese entities might also face indirect risks through supply chain or third-party compromise. Overall, the campaign exemplifies the persistent threat of targeted social engineering combined with sophisticated payload delivery, which European organizations must be prepared to defend against.

Mitigation Recommendations

1. Implement targeted security awareness training focusing on spear-phishing, especially educating users to scrutinize unsolicited resumes or attachments from unknown sources. 2. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and anomalous use of Windows utilities. 3. Monitor and block network traffic to known malicious domains and IPs associated with the campaign, such as those identified in the indicators of compromise. 4. Enforce application whitelisting and restrict execution of LNK files from email attachments or untrusted locations. 5. Regularly audit and monitor browser credential stores and implement multi-factor authentication (MFA) to reduce the impact of stolen credentials. 6. Use threat intelligence feeds to update detection rules with hashes and domains linked to LOTUSHARVEST and related payloads. 7. Conduct regular incident response exercises simulating spear-phishing and DLL sideloading attacks to improve detection and containment capabilities. 8. Limit user privileges to prevent unauthorized DLL loading and reduce the attack surface. 9. Employ network segmentation to contain potential breaches and prevent lateral movement. 10. Collaborate with regional cybersecurity communities to share intelligence and best practices regarding emerging APT campaigns.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.seqrite.com/blog/9479-2/"]
Adversary
null
Pulse Id
6929ac76bedd4839dedec743
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash00839f128a2daa17623bf578cd7e2a85
hash944ff8c66e470e1477231f5e9e79ca65
hashd1475da8025b4fc74e23814cdbb2b8d0
hashfc4ee75d5bec11da8904ccb630f0a96d
hash6712001f18151927935f017d004bf0e096cc8123
hash757b3e498fe37cad3670c658803401ffa235c389
hash8f24ce018d5122fc7a89bad3ab52cd50f28d0c70
hasha2d4755b3c103983ce0273e682de9d07efb9363a
hash1beb8fb1b6283dc7fffedcc2f058836d895d92b2fb2c37d982714af648994fed
hash48e18db10bf9fa0033affaed849f053bd20c59b32b71855d1cc72f613d0cac4b
hash693ea9f0837c9e0c0413da6198b6316a6ca6dfd9f4d3db71664d2270a65bcf38
hash77373ee9869b492de0db2462efd5d3eff910b227e53d238fae16ad011826388a

Domain

ValueDescriptionCopy
domaineol4hkm8mfoeevs.m.pipedream.net
domainuuhlswlx.requestrepo.com

Threat ID: 6929efc34121026312bf9b93

Added to database: 11/28/2025, 6:53:55 PM

Last enriched: 11/28/2025, 7:08:54 PM

Last updated: 12/5/2025, 1:25:48 AM

Views: 443

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats