Operation Hanoi Thief: Vietnam APT
Operation Hanoi Thief is a spear-phishing campaign targeting Vietnamese IT professionals and recruitment teams. It uses malicious ZIP files containing fake resumes and LNK files that execute a pseudo-polyglot payload. This payload deploys a C++ DLL implant named LOTUSHARVEST via DLL sideloading, which steals browser credentials and history. The stolen data is exfiltrated to attacker-controlled servers. The campaign uses anti-analysis techniques and abuses trusted Windows tools to evade detection. While it shares similarities with Chinese-origin campaigns, state sponsorship is not confirmed. The attack primarily affects Vietnam's IT and recruitment sectors, with no known exploits in the wild beyond spear-phishing. The campaign poses a medium severity threat due to its targeted nature and credential theft capabilities. European organizations are not directly targeted but could be at risk if similar tactics spread. Mitigation requires focused user training, monitoring for DLL sideloading, and blocking known indicators of compromise.
AI Analysis
Technical Summary
Operation Hanoi Thief is a targeted spear-phishing campaign aimed at Vietnamese IT professionals and recruitment personnel. The attack vector involves sending malicious ZIP archives containing a fake resume and an LNK file. When the LNK file is opened, it executes a pseudo-polyglot payload that leverages DLL sideloading to deploy a C++ DLL implant called LOTUSHARVEST. This implant functions as an information stealer, primarily harvesting browser credentials and browsing history from infected systems. The stolen data is then exfiltrated to attacker-controlled domains such as eol4hkm8mfoeevs.m.pipedream.net and uuhlswlx.requestrepo.com. The campaign employs multiple anti-analysis techniques to evade detection and abuses trusted Windows utilities to blend in with normal system activity. Although there are similarities to previous Chinese-origin APT campaigns, definitive attribution to a nation-state actor remains inconclusive. The campaign focuses on the Information Technology and Recruitment sectors within Vietnam, exploiting the trust and interest in job applications to lure victims. The attack chain involves techniques mapped to MITRE ATT&CK such as spear-phishing attachments (T1566.001), DLL sideloading (T1574.002), credential dumping (T1555.003), and data exfiltration (T1041). No CVEs or known exploits in the wild are associated with this campaign, indicating it relies on social engineering and living-off-the-land tactics rather than software vulnerabilities. The medium severity rating reflects the targeted nature and potential for credential compromise, which could lead to further network intrusion or espionage.
Potential Impact
For European organizations, the direct impact of Operation Hanoi Thief is currently limited due to its focus on Vietnamese IT and recruitment sectors. However, the tactics used—such as spear-phishing with malicious LNK files, DLL sideloading, and information stealing—are common in APT campaigns and could be adapted or replicated against European targets. If threat actors behind this campaign expand their targeting or share tools and techniques, European IT and recruitment sectors could face similar risks, including credential theft leading to unauthorized access, lateral movement, and data breaches. The exfiltration of browser credentials and history can compromise user accounts and sensitive information, potentially affecting confidentiality and integrity. The use of trusted Windows tools and anti-analysis techniques complicates detection and response, increasing the risk of prolonged undetected presence. Organizations with significant interactions or partnerships with Vietnamese entities might also face indirect risks through supply chain or third-party compromise. Overall, the campaign exemplifies the persistent threat of targeted social engineering combined with sophisticated payload delivery, which European organizations must be prepared to defend against.
Mitigation Recommendations
1. Implement targeted security awareness training focusing on spear-phishing, especially educating users to scrutinize unsolicited resumes or attachments from unknown sources. 2. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and anomalous use of Windows utilities. 3. Monitor and block network traffic to known malicious domains and IPs associated with the campaign, such as those identified in the indicators of compromise. 4. Enforce application whitelisting and restrict execution of LNK files from email attachments or untrusted locations. 5. Regularly audit and monitor browser credential stores and implement multi-factor authentication (MFA) to reduce the impact of stolen credentials. 6. Use threat intelligence feeds to update detection rules with hashes and domains linked to LOTUSHARVEST and related payloads. 7. Conduct regular incident response exercises simulating spear-phishing and DLL sideloading attacks to improve detection and containment capabilities. 8. Limit user privileges to prevent unauthorized DLL loading and reduce the attack surface. 9. Employ network segmentation to contain potential breaches and prevent lateral movement. 10. Collaborate with regional cybersecurity communities to share intelligence and best practices regarding emerging APT campaigns.
Affected Countries
Vietnam, France, Germany, United Kingdom, Netherlands
Indicators of Compromise
- hash: 00839f128a2daa17623bf578cd7e2a85
- hash: 944ff8c66e470e1477231f5e9e79ca65
- hash: d1475da8025b4fc74e23814cdbb2b8d0
- hash: fc4ee75d5bec11da8904ccb630f0a96d
- hash: 6712001f18151927935f017d004bf0e096cc8123
- hash: 757b3e498fe37cad3670c658803401ffa235c389
- hash: 8f24ce018d5122fc7a89bad3ab52cd50f28d0c70
- hash: a2d4755b3c103983ce0273e682de9d07efb9363a
- hash: 1beb8fb1b6283dc7fffedcc2f058836d895d92b2fb2c37d982714af648994fed
- hash: 48e18db10bf9fa0033affaed849f053bd20c59b32b71855d1cc72f613d0cac4b
- hash: 693ea9f0837c9e0c0413da6198b6316a6ca6dfd9f4d3db71664d2270a65bcf38
- hash: 77373ee9869b492de0db2462efd5d3eff910b227e53d238fae16ad011826388a
- domain: eol4hkm8mfoeevs.m.pipedream.net
- domain: uuhlswlx.requestrepo.com
Operation Hanoi Thief: Vietnam APT
Description
Operation Hanoi Thief is a spear-phishing campaign targeting Vietnamese IT professionals and recruitment teams. It uses malicious ZIP files containing fake resumes and LNK files that execute a pseudo-polyglot payload. This payload deploys a C++ DLL implant named LOTUSHARVEST via DLL sideloading, which steals browser credentials and history. The stolen data is exfiltrated to attacker-controlled servers. The campaign uses anti-analysis techniques and abuses trusted Windows tools to evade detection. While it shares similarities with Chinese-origin campaigns, state sponsorship is not confirmed. The attack primarily affects Vietnam's IT and recruitment sectors, with no known exploits in the wild beyond spear-phishing. The campaign poses a medium severity threat due to its targeted nature and credential theft capabilities. European organizations are not directly targeted but could be at risk if similar tactics spread. Mitigation requires focused user training, monitoring for DLL sideloading, and blocking known indicators of compromise.
AI-Powered Analysis
Technical Analysis
Operation Hanoi Thief is a targeted spear-phishing campaign aimed at Vietnamese IT professionals and recruitment personnel. The attack vector involves sending malicious ZIP archives containing a fake resume and an LNK file. When the LNK file is opened, it executes a pseudo-polyglot payload that leverages DLL sideloading to deploy a C++ DLL implant called LOTUSHARVEST. This implant functions as an information stealer, primarily harvesting browser credentials and browsing history from infected systems. The stolen data is then exfiltrated to attacker-controlled domains such as eol4hkm8mfoeevs.m.pipedream.net and uuhlswlx.requestrepo.com. The campaign employs multiple anti-analysis techniques to evade detection and abuses trusted Windows utilities to blend in with normal system activity. Although there are similarities to previous Chinese-origin APT campaigns, definitive attribution to a nation-state actor remains inconclusive. The campaign focuses on the Information Technology and Recruitment sectors within Vietnam, exploiting the trust and interest in job applications to lure victims. The attack chain involves techniques mapped to MITRE ATT&CK such as spear-phishing attachments (T1566.001), DLL sideloading (T1574.002), credential dumping (T1555.003), and data exfiltration (T1041). No CVEs or known exploits in the wild are associated with this campaign, indicating it relies on social engineering and living-off-the-land tactics rather than software vulnerabilities. The medium severity rating reflects the targeted nature and potential for credential compromise, which could lead to further network intrusion or espionage.
Potential Impact
For European organizations, the direct impact of Operation Hanoi Thief is currently limited due to its focus on Vietnamese IT and recruitment sectors. However, the tactics used—such as spear-phishing with malicious LNK files, DLL sideloading, and information stealing—are common in APT campaigns and could be adapted or replicated against European targets. If threat actors behind this campaign expand their targeting or share tools and techniques, European IT and recruitment sectors could face similar risks, including credential theft leading to unauthorized access, lateral movement, and data breaches. The exfiltration of browser credentials and history can compromise user accounts and sensitive information, potentially affecting confidentiality and integrity. The use of trusted Windows tools and anti-analysis techniques complicates detection and response, increasing the risk of prolonged undetected presence. Organizations with significant interactions or partnerships with Vietnamese entities might also face indirect risks through supply chain or third-party compromise. Overall, the campaign exemplifies the persistent threat of targeted social engineering combined with sophisticated payload delivery, which European organizations must be prepared to defend against.
Mitigation Recommendations
1. Implement targeted security awareness training focusing on spear-phishing, especially educating users to scrutinize unsolicited resumes or attachments from unknown sources. 2. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and anomalous use of Windows utilities. 3. Monitor and block network traffic to known malicious domains and IPs associated with the campaign, such as those identified in the indicators of compromise. 4. Enforce application whitelisting and restrict execution of LNK files from email attachments or untrusted locations. 5. Regularly audit and monitor browser credential stores and implement multi-factor authentication (MFA) to reduce the impact of stolen credentials. 6. Use threat intelligence feeds to update detection rules with hashes and domains linked to LOTUSHARVEST and related payloads. 7. Conduct regular incident response exercises simulating spear-phishing and DLL sideloading attacks to improve detection and containment capabilities. 8. Limit user privileges to prevent unauthorized DLL loading and reduce the attack surface. 9. Employ network segmentation to contain potential breaches and prevent lateral movement. 10. Collaborate with regional cybersecurity communities to share intelligence and best practices regarding emerging APT campaigns.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.seqrite.com/blog/9479-2/"]
- Adversary
- null
- Pulse Id
- 6929ac76bedd4839dedec743
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash00839f128a2daa17623bf578cd7e2a85 | — | |
hash944ff8c66e470e1477231f5e9e79ca65 | — | |
hashd1475da8025b4fc74e23814cdbb2b8d0 | — | |
hashfc4ee75d5bec11da8904ccb630f0a96d | — | |
hash6712001f18151927935f017d004bf0e096cc8123 | — | |
hash757b3e498fe37cad3670c658803401ffa235c389 | — | |
hash8f24ce018d5122fc7a89bad3ab52cd50f28d0c70 | — | |
hasha2d4755b3c103983ce0273e682de9d07efb9363a | — | |
hash1beb8fb1b6283dc7fffedcc2f058836d895d92b2fb2c37d982714af648994fed | — | |
hash48e18db10bf9fa0033affaed849f053bd20c59b32b71855d1cc72f613d0cac4b | — | |
hash693ea9f0837c9e0c0413da6198b6316a6ca6dfd9f4d3db71664d2270a65bcf38 | — | |
hash77373ee9869b492de0db2462efd5d3eff910b227e53d238fae16ad011826388a | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaineol4hkm8mfoeevs.m.pipedream.net | — | |
domainuuhlswlx.requestrepo.com | — |
Threat ID: 6929efc34121026312bf9b93
Added to database: 11/28/2025, 6:53:55 PM
Last enriched: 11/28/2025, 7:08:54 PM
Last updated: 12/5/2025, 1:25:48 AM
Views: 443
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-04
MediumQilin Ransomware Claims Data Theft from Church of Scientology
MediumSilver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
MediumNew Android malware lets criminals control your phone and drain your bank account
MediumNewly Sold Albiriox Android Malware Targets Banks and Crypto Holders
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.