SOC Prime Bias: Critical

20 Jan 2026 20:27

Operation Poseidon: Spear-Phishing Attacks Abusing Google Ads Redirection Mechanisms

Author Photo
Ruslan Mikhalov Chief of Threat Research at SOC Prime linkedin icon Follow
Operation Poseidon: Spear-Phishing Attacks Abusing Google Ads Redirection Mechanisms
shield icon

Detection stack

  • AIDR
  • Alert
  • ETL
  • Query

Summary

Operation Poseidon is a spear-phishing campaign attributed to the Konni APT that weaponizes Google and Naver ad click-tracking/redirection URLs to deliver malicious LNK shortcut files. When opened, the LNK triggers an AutoIt loader that executes EndRAT predominantly in memory. The operation relies on compromised WordPress sites for payload hosting and command-and-control (C2) services.

Investigation

Genians Security Center reviewed the phishing email lures, embedded tracking beacons, and the end-to-end execution flow—from LNK shortcut launch to the AutoIt staging logic and in-memory EndRAT deployment. Analysts also noted infrastructure and development artefact reuse, including the domain jlrandsons.co.uk and the build path D:3_Attack WeaponAutoitBuild__Poseidon – Attackclient3.3.14.a3x.

Mitigation

Prevent execution of LNK files delivered inside ZIP archives, and scrutinize ad-click redirection chains originating from Google/Naver tracking domains. Enforce strict EDR coverage for AutoIt activity and suspicious process spawning (notably abnormal PowerShell or cmd.exe launches). Reduce infrastructure abuse by hardening and routinely patching WordPress instances to limit their use as malware distribution points.

Response

Alert on initial LNK execution events, flag AutoIt.exe runs initiated by user interaction, and monitor outbound connections to the identified C2 domains and IPs. Quarantine suspected endpoints and collect forensic artefacts, including the AutoIt script, LNK metadata, and any recovered EndRAT components, to support scoping and eradication.

"graph TB %% Class Definitions classDef action fill:#99ccff %% Node definitions node_phishing["<b>Action</b> – <b>T1566.001 Spearphishing Attachment</b><br/><b>Description</b>: Send spearu2011phishing email with a malicious ZIP file that contains a LNK shortcut."] class node_phishing action node_user_execution["<b>Action</b> – <b>T1204.001 User Execution Malicious Link</b><br/><b>Description</b>: Victim clicks a redirect URL (ad.doubleclick.net) which leads to a malicious download."] class node_user_execution action node_lnk_smuggling["<b>Action</b> – <b>T1027.012 LNK Icon Smuggling</b><br/><b>Description</b>: LNK shortcut hides malicious payload behind a benign icon and launches an AutoIt script."] class node_lnk_smuggling action node_autohotkey_autoit["<b>Action</b> – <b>T1059.010 Command and Scripting Interpreter AutoHotKey and AutoIT</b><br/><b>Description</b>: AutoIt script masquerading as a PDF loads the EndRAT payload directly in memory."] class node_autohotkey_autoit action node_masquerade["<b>Action</b> – <b>T1036.008 Masquerade File Type</b><br/><b>Description</b>: The malicious script is presented with a .pdf extension to appear legitimate."] class node_masquerade action node_web_service["<b>Action</b> – <b>T1102 Web Service</b><br/><b>Description</b>: Compromised WordPress site is used to host the payload and to communicate with the command and control server."] class node_web_service action %% Connections node_phishing –>|leads_to| node_user_execution node_user_execution –>|leads_to| node_lnk_smuggling node_lnk_smuggling –>|leads_to| node_autohotkey_autoit node_autohotkey_autoit –>|leads_to| node_masquerade node_autohotkey_autoit –>|leads_to| node_web_service "

Attack Flow

Simulation Execution

Prerequisite: The Telemetry & Baseline Pre‑flight Check must have passed.

Rationale: This section details the precise execution of the adversary technique (TTP) designed to trigger the detection rule. The commands and narrative MUST directly reflect the TTPs identified and aim to generate the exact telemetry expected by the detection logic.

  • Attack Narrative & Commands:

    An attacker crafts a malicious shortcut (malicious.lnk) that points to powershell.exe with an encoded command to download and execute a payload. The shortcut is delivered via spear‑phishing email. Upon double‑click, Windows Explorer resolves the .lnk, spawning powershell.exe as a child of the LNK process. This exact parent‑child relationship satisfies the Sigma rule’s execution_after_LNK condition.

  • Regression Test Script:

    # -------------------------------------------------------------
    # Create a malicious LNK that launches PowerShell with an encoded command
    # -------------------------------------------------------------
    $WshShell = New-Object -ComObject WScript.Shell
    
    # Path where the LNK will be created (Desktop)
    $lnkPath = "$Env:UserProfileDesktopmalicious.lnk"
    
    # Target executable
    $target = "$Env:SystemRootSystem32WindowsPowerShellv1.0powershell.exe"
    
    # Example encoded command (creates a text file as a harmless indicator)
    $plainCmd = "New-Item -Path $Env:Tempposeidon_test.txt -ItemType File -Force"
    $bytes = [System.Text.Encoding]::Unicode.GetBytes($plainCmd)
    $encoded = [Convert]::ToBase64String($bytes)
    
    $arguments = "-EncodedCommand $encoded"
    
    $shortcut = $WshShell.CreateShortcut($lnkPath)
    $shortcut.TargetPath = $target
    $shortcut.Arguments = $arguments
    $shortcut.Save()
    
    Write-Host "LNK created at $lnkPath"
    
    # -------------------------------------------------------------
    # Execute the LNK to trigger the detection rule
    # -------------------------------------------------------------
    Start-Process -FilePath $lnkPath
    
    # -------------------------------------------------------------
    # Optional: pause to allow SIEM ingestion
    # -------------------------------------------------------------
    Start-Sleep -Seconds 10
    
    # -------------------------------------------------------------
    # Cleanup (remove the indicator file, the LNK, and the indicator)
    # -------------------------------------------------------------
    Remove-Item -Path "$Env:Tempposeidon_test.txt" -ErrorAction SilentlyContinue
    Remove-Item -Path $lnkPath -ErrorAction SilentlyContinue
    
    Write-Host "Cleanup completed."
  • Cleanup Commands: (if the above script is not used)

    # Remove any indicator files created during the test
    Remove-Item -Path "$Env:Tempposeidon_test.txt" -ErrorAction SilentlyContinue
    
    # Delete the malicious shortcut
    $lnkPath = "$Env:UserProfileDesktopmalicious.lnk"
    Remove-Item -Path $lnkPath -ErrorAction SilentlyContinue
    
    Write-Host "Test artifacts removed."