A sophisticated cyberattack campaign targeting German organizations has been uncovered, utilizing weaponized LNK files to deploy the Sliver implant.
The attack begins with a deceptive archive file named “Homeoffice-Vereinbarung-2025.7z,” likely distributed via spear-phishing emails.
When extracted, the archive reveals a shortcut (.LNK) file disguised as a PDF document, exploiting user trust to initiate the infection chain.
Cybersecurity researchers at Cyble have identified this ongoing threat, which employs advanced evasion techniques to compromise systems and exfiltrate sensitive data.
Upon execution, the LNK file triggers a series of covert actions:-
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
The malicious payload employs sophisticated techniques to evade detection:-
The attack leverages multiple stages to deploy its final payload:-
Once active, the Sliver implant establishes communication with its C2 servers:-
The implant uses Mutual TLS (mTLS) for secure communication, making detection more challenging. It has been observed using destination port 53, typically reserved for DNS requests, for its SSL connections.
Sliver’s capabilities include dynamic code generation, compile-time obfuscation, and support for both staged and stageless payloads.
This versatility allows attackers to conduct various malicious activities, including data exfiltration and further system compromise.
While attribution remains uncertain, the attack’s sophistication and targeting of German entities suggest a well-resourced threat actor.
The use of Sliver, previously associated with APT groups, indicates a potential shift in tooling among advanced persistent threats.
To defend against this threat, organizations should:-
Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar