North Korea-Linked Hackers Use GitHub as C2 Infrastructure to Attack South Korea Executive Summary FortiGuard Labs has identified a sophisticated multi-stage attack campaign attributed to the North...
#kimsuky #c2 #cybersecurity #powershell
Origin | Interest | Match
"Blurred Lines of Potato Threat Attribution: The Evolving Tactics of North Korean Potato Threat Actors" published by Zscaler. #Kimsuky, #Lazarus, #Slides, #DPRK, #CTI www.dailysecu.com/form/html/k-cti/pdf/2026...
"Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors" published by Zscaler. #Kimsuky, #Lazarus, #Slides, #DPRK, #CTI www.dailysecu.com/form/html/k-cti/pdf/2026...
DPRK-linked hackers deploy phishing LNK files dropping decoy PDFs and hidden PowerShell scripts that perform anti-analysis, maintain persistence, and use GitHub repos for command and control in attacks targeting South Korea. #Kimsuky #SouthKorea
"DPRK Malware Modularity: Diversity and Functional Specialization" published by Domaintools. #Andariel, #Kimsuky, #Lazarus, #Trend, #DPRK, #CTI dti.domaintools.com/research/dprk-malware-mo...
"Malicious LNK Files Distributing a Python-Based Backdoor and Changes in Distribution Techniques (Kimsuky Group)" published by Ahnlab. #Kimsuky, #LNK, #DPRK, #CTI https://asec.ahnlab.com/en/93151/
"파이썬 기반 백도어를 유포하는 악성 LNK 및 유포 방식의 변화 (Kimsuky 그룹)" published by Ahnlab. #Kimsuky, #LNK, #DPRK, #CTI https://asec.ahnlab.com/ko/93150/
Kimsuky APT group escalates attacks using malicious LNK files to deploy Python-based backdoors. Stay vigilant and enhance your cybersecurity defenses. #CyberSecurity #Kimsuky #APT #Malware Link: thedailytechfeed.com/kimsuky-targ...
Kimsuky’s LNK-based attack chain now includes multiple stages (XML, VBS, PS1, BAT) before deploying a Python backdoor via ZIP fragments and Task Scheduler. Uses Dropbox and custom C2 for data exfiltration. #Kimsuky #PythonBackdoor #SouthKorea
김수키(Kimsuky)에서 만든 악성코드-구매 주문서 SBPL2509217 (개정 1).pdf.js
wezard4u.tistory.com/429743
#김수키 #Kimsuky #it
김수키(Kimsuky) 대외보안 0223_주미한국대사관_비공개_정책간담회_계획안 문서로 위장한 악성코드
wezard4u.tistory.com/429736
#김수키 #Kimsuky #악성코드 #분석 #it
"Dropbox APIを使用するKimsukyのマルウェア" published by IIJSECT. #Kimsuky, #LNK, #DPRK, #CTI sect.iij.ad.jp/blog/2026/03/dropbox-api...
김수키(Kimsuky) 에서 만든 악성코드-첨부_거래명세서_1473_260101_260221.lnk
wezard4u.tistory.com/429728
#김수키 #Kimsuky #악성코드
북한 김수키(Kimsuky)에서 만든 스마트폰 악성코드-app-release.apk
wezard4u.tistory.com/429726
#북한 #악성코드 #김수키 #Kimsuky #스마트폰
김수키(Kimsuky) 한국동서발전 노린것으로 추정 되는 악성코드-Screenshot 2026-02-24 085012.scr
wezard4u.tistory.com/429719
#김수키 #Kimsuky
김수키(Kimsuky) 코인 실전 트레이딩 핵심 비법서로 위장한 악성코드-실전 트레이딩 핵심 비법서.pdf.lnk
wezard4u.tistory.com/429715
#코인 #김수키 #Kimsuky
Kimsuky(김수키)과태료 부과 사전 통지서 로 위장한 악성코드-IPSInvoice.chm
wezard4u.tistory.com/429713
#김수키 #Kimsuky #분석 #악성코드
김수키(Kimsuky) 통일 연구원 사칭 악성코드 분석-2026_0212_1281232903482939_참고자료.lnk
wezard4u.tistory.com/429712
#김수키 #Kimsuky #dprk
"2026년 1월 APT 그룹 동향 보고서" published by Ahnlab. #Andariel, #Kimsuky, #Trend, #DPRK, #CTI https://asec.ahnlab.com/ko/92548/
"Analysis of a JSE File (Kimsuky APT)" published by Shubho57. #JSE, #Kimsuky, #DPRK, #CTI medium.com/@shubhandrew/analysis-of...
The APTs That Defined 2025 open.substack.com/pub/malwhere...
#APT #China #Russia #DPRK #Iran #ThreatIntel #CyberSecurity #SaltTyphoon #FlaxTyphoon #MustangPanda #APT17 #APT28 #APT29 #Sandworm #LazarusGroup #Kimsuky #APT42