HomeCyber BalkansNorth Korean Kimsuky Hackers Use Fresh Tactics and Malicious Scripts in Recent...

North Korean Kimsuky Hackers Use Fresh Tactics and Malicious Scripts in Recent Attacks

Published on

spot_img

Security researchers have recently discovered a new wave of cyberattacks orchestrated by the North Korean state-sponsored APT group known as Kimsuky, also referred to as “Black Banshee.” This group, which has been active since at least 2012, has been utilizing advanced strategies and malicious scripts in their latest campaign targeting countries like South Korea, Japan, and the United States.

The attack kicks off with a ZIP file that includes four components: a VBScript, a PowerShell script, and two encoded text files. The VBScript makes use of obfuscation techniques, such as chr() and CLng() functions, to dynamically generate characters and execute commands, allowing it to evade signature-based detection methods effectively.

Upon execution, the initial script triggers a PowerShell component that decodes base64-encoded data from one of the text files. According to the report released by security experts, this decoded script carries out critical functions like system reconnaissance, data exfiltration, and command-and-control (C2) communication. Additionally, the malware showcases VM-aware behavior, terminating its operation upon detecting a virtual machine environment. For non-VM targets, it proceeds to gather sensitive information, including the BIOS serial number, which is then used to create a unique directory for storing attack-related files.

The Kimsuky malware displays sophisticated capabilities for data exfiltration, targeting various browsers like Edge, Firefox, Chrome, and Naver Whale to extract user profiles, cookies, login information, and web data. Moreover, it looks for cryptocurrency wallet extensions and collects their associated files. Furthermore, the malware creates a detailed system profile by gathering hardware details, network adapter status, and a list of installed programs. It establishes persistence through scheduled tasks and continuously monitors the system for new data to exfiltrate. In the final stage of the attack, a keylogger component is deployed, utilizing Windows API functions to detect key presses, monitor clipboard activity, and log window titles.

The gathered data is periodically uploaded to the attacker’s C2 server, allowing real-time monitoring of the victim’s activities. The evolving tactics and multi-component approach employed by the Kimsuky group underscore the growing sophistication of state-sponsored cyber threats. As these attacks become more intricate and evasive, organizations need to maintain a proactive stance and implement robust security measures to safeguard themselves against advanced persistent threats.

In conclusion, the relentless efforts of security researchers in identifying and analyzing cyber threats like those orchestrated by the Kimsuky group are crucial in enhancing cybersecurity preparedness. By staying abreast of the latest tactics and techniques used by threat actors, organizations can better fortify their defenses and protect their sensitive data from malicious actors.

Source link

Latest articles

New Progress ShareFile Vulnerabilities Expose Servers to Unauthorized Remote Takeover

Critical Exploit Chain Discovered in Progress ShareFile Storage Zone Controller The cybersecurity landscape has recently...

New Phishing Platform Active in Credential Theft Campaigns

Uncovering the Venom Phishing Campaign: A Threat to Corporate Integrity A recent investigation by researchers...

Drift Loses $285 Million in DPRK-Linked Social Engineering Attack

  What Happened Solana-based decentralized exchange Drift confirmed that attackers drained approximately $285 million from...

Cyber Briefing – April 3, 2026 – CyberMaterial

Cybersecurity Updates: Key Developments and Alerts In the latest surge of incidents reported within the...

More like this

New Progress ShareFile Vulnerabilities Expose Servers to Unauthorized Remote Takeover

Critical Exploit Chain Discovered in Progress ShareFile Storage Zone Controller The cybersecurity landscape has recently...

New Phishing Platform Active in Credential Theft Campaigns

Uncovering the Venom Phishing Campaign: A Threat to Corporate Integrity A recent investigation by researchers...

Drift Loses $285 Million in DPRK-Linked Social Engineering Attack

  What Happened Solana-based decentralized exchange Drift confirmed that attackers drained approximately $285 million from...