Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. Kimsuky

Kimsuky

Kimsuky is a North Korea-based cyber espionage group that has been active since at least 2012. The group initially targeted South Korean government agencies, think tanks, and subject-matter experts in various fields. Its operations expanded to include the United Nations and organizations in the government, education, business services, and manufacturing sectors across the United States, Japan, Russia, and Europe.Kimsuky has focused collection on foreign policy and national security issues tied to the Korean Peninsula, nuclear policy, and sanctions. Its operations have overlapped with other DPRK actors, likely due to ad hoc collaboration or limited resource sharing.[1][2][3][4][5][6] Because of overlapping operations, some researchers group a wide range of North Korean state-sponsored cyber activity under the broaderLazarus Group umbrella rather than tracking separate subgroup or cluster distinctions.

Kimsuky was assessed to be responsible for the 2014 Korea Hydro & Nuclear Power Co. compromise; other notable campaigns include Operation STOLEN PENCIL (2018), Operation Kabar Cobra (2019), and Operation Smoke Screen (2019).[7][8][9]

In 2023,Kimsuky was observed using commercial large language models to assist with vulnerability research, scripting, social engineering and reconnaissance.[10]

ID: G0094
Associated Groups: Black Banshee, Velvet Chollima, Emerald Sleet, THALLIUM, APT43, TA427, Springtail
Contributors: Taewoo Lee, KISA; Dongwook Kim, KISA; Jaesang Oh, KC7 Foundation; Wai Linn Oo @ Kernellix
Version: 5.1
Created: 26 August 2019
Last Modified: 12 November 2025

Associated Group Descriptions

NameDescription
Black Banshee

[2][3]

Velvet Chollima

[11][12][3]

Emerald Sleet

[13][6]

THALLIUM

[2][3][5][6]

APT43

[5][6]

TA427

[6]

Springtail

[14]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1098.007Account Manipulation:Additional Local or Domain Groups

Kimsuky has added accounts to specific groups withnet localgroup.[15]

EnterpriseT1583Acquire Infrastructure

Kimsuky has used funds from stolen and laundered cryptocurrency to acquire operational infrastructure.[5]

.001Domains

Kimsuky has registered domains to spoof targeted organizations and trusted third parties including search engines, web platforms, and cryptocurrency exchanges.[12][16][4][2][3][15][5][17]

.004Server

Kimsuky has purchased hosting servers with virtual currency and prepaid cards.[15]

.006Web Services

Kimsuky has hosted content used for targeting efforts via web services such as Blogspot.[18]Kimsuky has also leveraged Dropbox for hosting payloads and uploading victim system information.[19]

EnterpriseT1557Adversary-in-the-Middle

Kimsuky has used modified versions of PHProxy to examine web traffic between the victim and the accessed website.[4]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

Kimsuky has used HTTP GET and POST requests for C2.[18]

.002Application Layer Protocol:File Transfer Protocols

Kimsuky has used FTP to download additional malware to the target machine.[20]

.003Application Layer Protocol:Mail Protocols

Kimsuky has used e-mail to send exfiltrated data to C2 servers.[4]

EnterpriseT1560.001Archive Collected Data:Archive via Utility

Kimsuky has used QuickZip to archive stolen files before exfiltration.[18]

.003Archive Collected Data:Archive via Custom Method

Kimsuky has used RC4 encryption before exfil.[21]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Kimsuky has placed scripts in the startup folder for persistence and modified theHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Registry key.[21][4][22][18][15]

EnterpriseT1185Browser Session Hijacking

Kimsuky has the ability to use form-grabbing to extract emails and passwords from web data forms.[23]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

Kimsuky has executed a variety of PowerShell scripts including Invoke-Mimikatz.[1][4][18][15][5]Kimsuky has also utilized PowerShell scripts for execution, persistence, and defense evasion.[19]

.003Command and Scripting Interpreter:Windows Command Shell

Kimsuky has executed Windows commands by usingcmd and running batch scripts.[18][15]

.005Command and Scripting Interpreter:Visual Basic

Kimsuky has used Visual Basic to download malicious payloads.[12][20][22][18]Kimsuky has also used malicious VBA macros within maldocs disguised as forms that trigger when a victim types any content into the lure.[18]

.006Command and Scripting Interpreter:Python

Kimsuky has used a macOS Python implant to gather data as well as MailFetcher.py code to automatically collect email data.[4][15]

.007Command and Scripting Interpreter:JavaScript

Kimsuky has used JScript for logging and downloading additional tools.[20][4]Kimsuky has usedTRANSLATEXT, which contained four Javascript files for bypassing defenses, collecting sensitive information and screenshots, and exfiltrating data.[23]

EnterpriseT1586.002Compromise Accounts:Email Accounts

Kimsuky has compromised email accounts to send spearphishing e-mails.[20][3]

EnterpriseT1584.001Compromise Infrastructure:Domains

Kimsuky has compromised legitimate sites and used them to distribute malware.[15][5][17]

EnterpriseT1136.001Create Account:Local Account

Kimsuky has created accounts withnet user.[15]

EnterpriseT1543.003Create or Modify System Process:Windows Service

Kimsuky has created new services for persistence.[21][4]

EnterpriseT1555.003Credentials from Password Stores:Credentials from Web Browsers

Kimsuky has used browser extensions including Google Chrome to steal passwords and cookies from browsers.Kimsuky has also used Nirsoft's WebBrowserPassView tool to dump the passwords obtained from victims.[11][4][7][18]

EnterpriseT1005Data from Local System

Kimsuky has collected Office, PDF, and HWP documents from its victims.[21][18]

EnterpriseT1074.001Data Staged:Local Data Staging

Kimsuky has staged collected data files underC:\Program Files\Common Files\System\Ole DB\.[4][18]

EnterpriseT1140Deobfuscate/Decode Files or Information

Kimsuky has decoded malicious VBScripts using Base64.[18]Kimsuky has also decoded malicious PowerShell scripts using Base64.[19]

EnterpriseT1587Develop Capabilities

Kimsuky created and used a mailing toolkit to use in spearphishing attacks.[20]

.001Malware

Kimsuky has developed its own unique malware such as MailFetch.py for use in operations.[15][18][5]

EnterpriseT1114.002Email Collection:Remote Email Collection

Kimsuky has used tools such as the MailFetch mail crawler to collect victim emails (excluding spam) from online services via IMAP.[15]

.003Email Collection:Email Forwarding Rule

Kimsuky has set auto-forward rules on victim's e-mail accounts.[4]

EnterpriseT1585Establish Accounts

Kimsuky has leveraged stolen PII to create accounts.[17]

.001Social Media Accounts

Kimsuky has created social media accounts to monitor news and security trends as well as potential targets.[15]

.002Email Accounts

Kimsuky has created email accounts for phishing operations.[15][5][6]

EnterpriseT1546.001Event Triggered Execution:Change Default File Association

Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents.[21]

EnterpriseT1041Exfiltration Over C2 Channel

Kimsuky has exfiltrated data over its C2 channel.[21][18]

EnterpriseT1567.002Exfiltration Over Web Service:Exfiltration to Cloud Storage

Kimsuky has exfiltrated stolen files and data to actor-controlled Blogspot accounts.[18]Kimsuky has also leveraged Dropbox for uploading victim system information.[19]

EnterpriseT1190Exploit Public-Facing Application

Kimsuky has exploited various vulnerabilities for initial access, including Microsoft Exchange vulnerability CVE-2020-0688.[15]

EnterpriseT1133External Remote Services

Kimsuky has used RDP to establish persistence.[4]

EnterpriseT1083File and Directory Discovery

Kimsuky has the ability to enumerate all files and directories on an infected system.[21][18][15]

EnterpriseT1657Financial Theft

Kimsuky has stolen and laundered cryptocurrency to self-fund operations including the acquisition of infrastructure.[5][17]

EnterpriseT1589.002Gather Victim Identity Information:Email Addresses

Kimsuky has collected valid email addresses including personal accounts that were subsequently used for spearphishing and other forms of social engineering.[3][6][17]

.003Gather Victim Identity Information:Employee Names

Kimsuky has collected victim employee name information.[15]

EnterpriseT1591Gather Victim Org Information

Kimsuky has collected victim organization information including but not limited to organization hierarchy, functions, press releases, and others.[15]Kimsuky has also used large language models (LLMs) to gather information about potential targets of interest.[10]

EnterpriseT1564.002Hide Artifacts:Hidden Users

Kimsuky has runreg add ‘HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList’ /v to hide a newly created user.[15]

.003Hide Artifacts:Hidden Window

Kimsuky has used an information gathering module that will hide an AV software window from the victim.[18]Kimsuky has also been known to use-WindowStyle Hidden to conceal PowerShell windows.[19]

EnterpriseT1562.001Impair Defenses:Disable or Modify Tools

Kimsuky has been observed turning off Windows Security Center and can hide the AV software window from the view of the infected user.[21][18]

.004Impair Defenses:Disable or Modify System Firewall

Kimsuky has been observed disabling the system firewall.[21]

EnterpriseT1656Impersonation

Kimsuky has impersonated academic institutions and NGOs in order to gain information related to North Korea.[10]

EnterpriseT1070.004Indicator Removal:File Deletion

Kimsuky has deleted the exfiltrated data on disk after transmission.Kimsuky has also used an instrumentor script to terminate browser processes running on an infected system and then delete the cookie files on disk.[21][18][15]Kimsuky has deleted files using theRemove-Item PowerShell commandlet to remove traces of executed payloads.[19]

.006Indicator Removal:Timestomp

Kimsuky has manipulated timestamps for creation or compilation dates to defeat anti-forensics.[2]

EnterpriseT1105Ingress Tool Transfer

Kimsuky has downloaded additional scripts, tools, and malware onto victim systems.[18][22][19]

EnterpriseT1056.001Input Capture:Keylogging

Kimsuky has used a PowerShell-based keylogger as well as a tool called MECHANICAL to log keystrokes.[1][21][4][7][18][15]

EnterpriseT1534Internal Spearphishing

Kimsuky has sent internal spearphishing emails for lateral movement after stealing victim information.[15]

EnterpriseT1680Local Storage Discovery

Kimsuky has enumerated drives.[21][18]

EnterpriseT1036.004Masquerading:Masquerade Task or Service

Kimsuky has disguised services to appear as benign software or related to operating system functions.[4][19]

.005Masquerading:Match Legitimate Resource Name or Location

Kimsuky has renamed malware to legitimate names such asESTCommon.dll orpatch.dll.[24]Kimsuky has also disguised payloads using legitimate file names including a PowerShell payload named chrome.ps1.[19]

.007Masquerading:Double File Extension

Kimsuky has used an additional filename extension to hide the true file type.Kimsuky has also masqueraded malicious LNK files as PDF objects using the double extension .pdf.lnk.[19]

EnterpriseT1112Modify Registry

Kimsuky has modified Registry settings for default file associations to enable all macros and for persistence.[4][22][18][15]

EnterpriseT1111Multi-Factor Authentication Interception

Kimsuky has used a proprietary tool to intercept one time passwords required for two-factor authentication.[15]

EnterpriseT1040Network Sniffing

Kimsuky has used the Nirsoft SniffPass network sniffer to obtain passwords sent over non-secure protocols.[4][7]

EnterpriseT1027Obfuscated Files or Information

Kimsuky has obfuscated binary strings including the use of XOR encryption and Base64 encoding.[12][20]Kimsuky has also modified the first byte of DLL implants targeting victims to prevent recognition of the executable file format.[18]

.001Binary Padding

Kimsuky has performed padding of PowerShell command line code with over 100 spaces.[19]

.002Software Packing

Kimsuky has packed malware with UPX.[3]

.010Command Obfuscation

Kimsuky has encoded malicious PowerShell scripts using Base64.[19]

.012LNK Icon Smuggling

Kimsuky has used the LNK icon location to execute malicious scripts.Kimsuky has also padded the LNK target field properties with extra spaces to obscure the script.[19]

.016Junk Code Insertion

Kimsuky has obfuscated code by filling scripts with junk code and concatenating strings to hamper analysis and detection.[19]

EnterpriseT1588.002Obtain Capabilities:Tool

Kimsuky has obtained and used tools such as Nirsoft WebBrowserPassVIew,Mimikatz, andPsExec.[7][18][5]

.003Obtain Capabilities:Code Signing Certificates

Kimsuky has stolen a valid certificate that is used to sign the malware and the dropper.[25]

.005Obtain Capabilities:Exploits

Kimsuky has obtained exploit code for various CVEs.[15]

EnterpriseT1003.001OS Credential Dumping:LSASS Memory

Kimsuky has gathered credentials usingMimikatz and ProcDump.[4][7][15]

EnterpriseT1566Phishing

Kimsuky has used spearphishing to gain initial access and intelligence.[10][17]

.001Spearphishing Attachment

Kimsuky has used emails containing Word, Excel and/or HWP (Hangul Word Processor) documents in their spearphishing campaigns.[11][21][12][20][2][3][18][15]Kimsuky has also distributed emails with attached compressed zip files that contained malicious .LNK files masquerading as legitimate files.[19]

.002Spearphishing Link

Kimsuky has sent spearphishing emails containing a link to a document that contained malicious macros or took the victim to an actor-controlled domain.[1][7][15]

EnterpriseT1598Phishing for Information

Kimsuky has used tailored spearphishing emails to gather victim information including contat lists to identify additional targets.[5]

.003Spearphishing Link

Kimsuky has used links in e-mail to steal account information including web beacons for target profiling.[20][3][15][6]

EnterpriseT1057Process Discovery

Kimsuky can gather a list of all processes running on a victim's machine.[18]Kimsuky has also obtained running processes on the victim device utilizing PowerShell cmdletGet-Process.[19]

EnterpriseT1055Process Injection

Kimsuky has used Win7Elevate to inject malicious code into explorer.exe.[21]

.012Process Hollowing

Kimsuky has used a file injector DLL to spawn a benign process on the victim's system and inject the malicious payload into it via process hollowing.[18]

EnterpriseT1012Query Registry

Kimsuky has obtained specific Registry keys and values on a compromised host.[18]

EnterpriseT1620Reflective Code Loading

Kimsuky has used the Invoke-Mimikatz PowerShell script to reflectively load a Mimikatz credential stealing DLL into memory.[5]Kimsuky has also used reflective loading through .NET assembly using[System.Reflection.Assembly]::Load.[19]

EnterpriseT1219.002Remote Access Tools:Remote Desktop Software

Kimsuky has used a modified TeamViewer client as a command and control channel.[21][22]

EnterpriseT1021.001Remote Services:Remote Desktop Protocol

Kimsuky has used RDP for direct remote point-and-click access.[7]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

Kimsuky has downloaded additional malware with scheduled tasks.[15]Kimsuky has established persistence by creating a scheduled task named "ChromeUpdateTaskMachine" through the PowerShell cmdletRegister-ScheduleTask which was set to execute another PowerShell script once, then five minutes after its creation and periodically repeat every 30 minutes.[19]

EnterpriseT1113Screen Capture

Kimsuky has captured browser screenshots usingTRANSLATEXT.[23]

EnterpriseT1596Search Open Technical Databases

Kimsuky has used LLMs to better understand publicly reported vulnerabilities.[10][26]

EnterpriseT1593Search Open Websites/Domains

Kimsuky has used LLMs to identify think tanks, government organizations, etc. that have information.[10]

.001Social Media

Kimsuky has used Twitter to monitor potential victims and to prepare targeted phishing e-mails.[3]

.002Search Engines

Kimsuky has searched for vulnerabilities, tools, and geopolitical trends on Google to target victims.[15]

EnterpriseT1594Search Victim-Owned Websites

Kimsuky has searched for information on the target company's website.[15]

EnterpriseT1505.003Server Software Component:Web Shell

Kimsuky has used modified versions of open source PHP web shells to maintain access, often adding "Dinosaur" references within the code.[4]

EnterpriseT1518.001Software Discovery:Security Software Discovery

Kimsuky has checked for the presence of antivirus software withpowershell Get-CimInstance -Namespace root/securityCenter2 – classname antivirusproduct.[15]Kimsuky has also obtained details on antivirus software through WMI queries usingWin32_OperatingSystem andSecurityCenter2.AntiVirusProduct.[19]

EnterpriseT1176.001Software Extensions:Browser Extensions

Kimsuky has used Google Chrome browser extensions to infect victims and to steal passwords and cookies.[11][7]

EnterpriseT1608.001Stage Capabilities:Upload Malware

Kimsuky has used compromised and acquired infrastructure to host and deliver malware including Blogspot to host beacons, file exfiltrators, and implants.[18][5][17]Kimsuky has also hosted malicious payloads on Dropbox.[19]

EnterpriseT1539Steal Web Session Cookie

Kimsuky has used malware, such asTRANSLATEXT, to steal and exfiltrate browser cookies.[23][25]

EnterpriseT1553.002Subvert Trust Controls:Code Signing

Kimsuky has signed files with the name EGIS CO,. Ltd. and has stolen a valid certificate that is used to sign the malware and the dropper.[12][25]

EnterpriseT1218.005System Binary Proxy Execution:Mshta

Kimsuky has used mshta.exe to run malicious scripts on the system.[1][4][22][15]

.010System Binary Proxy Execution:Regsvr32

Kimsuky has executed malware withregsvr32s.[15]

.011System Binary Proxy Execution:Rundll32

Kimsuky has usedrundll32.exe to execute malicious scripts and malware on a victim's network.[18]

EnterpriseT1082System Information Discovery

Kimsuky has enumerated OS type, OS version, and other information using a script or the "systeminfo" command.[21][18]Kimsuky has also obtained system information such as OS type, OS version, and system type through querying various Windows Management Instrumentation (WMI) classes includingWin32_OperatingSystem.[19]

EnterpriseT1016System Network Configuration Discovery

Kimsuky has usedipconfig/all and web beacons sent via email to gather network configuration information.[18][6]Kimsuky has also identified Host IP addresses leveraging the WMI classWin32_NetworkAdapterConfiguration.[19]

EnterpriseT1007System Service Discovery

Kimsuky has used an instrumentor script to gather the names of all services running on a victim's system.[18]

EnterpriseT1205Traffic Signaling

Kimsuky has usedTRANSLATEXT to redirect clients to legitimate Gmail, Naver or Kakao pages if the clients connect with no parameters.[23]

EnterpriseT1552.001Unsecured Credentials:Credentials In Files

Kimsuky has used tools that are capable of obtaining credentials from saved mail.[7]

EnterpriseT1550.002Use Alternate Authentication Material:Pass the Hash

Kimsuky has used pass the hash for authentication to remote access software used in C2.[4]

EnterpriseT1204.001User Execution:Malicious Link

Kimsuky has lured victims into clicking malicious links.[15]

.002User Execution:Malicious File

Kimsuky has attempted to lure victims into opening malicious e-mail attachments.[12][20][4][2][3][18]Kimsuky has also lured victims with tailored filenames and fake extensions that entice victims to open LNK files.[19]

EnterpriseT1078.003Valid Accounts:Local Accounts

Kimsuky has used a tool called GREASE to add a Windows admin account in order to allow them continued access via RDP.[7]

EnterpriseT1102.001Web Service:Dead Drop Resolver

Kimsuky has usedTRANSLATEXT and a dead drop resolver to retrieve configurations and commands from a public blog site.[23]

.002Web Service:Bidirectional Communication

Kimsuky has used Blogspot pages and a Github repository for C2.[18][23]Kimsuky has also leveraged Dropbox for downloading payloads and uploading victim system information.[19]

Software

IDNameReferencesTechniques
S1025Amadey[5][17]Application Layer Protocol:Web Protocols,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Data from Local System,Deobfuscate/Decode Files or Information,Dynamic Resolution:Fast Flux DNS,Exfiltration Over C2 Channel,File and Directory Discovery,Ingress Tool Transfer,Modify Registry,Native API,Obfuscated Files or Information,Software Discovery:Security Software Discovery,Subvert Trust Controls:Mark-of-the-Web Bypass,System Information Discovery,System Location Discovery,System Network Configuration Discovery,System Owner/User Discovery
S0622AppleSeed[3][15]Access Token Manipulation,Application Layer Protocol:Web Protocols,Archive Collected Data,Archive Collected Data:Archive via Utility,Automated Collection,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Command and Scripting Interpreter:JavaScript,Command and Scripting Interpreter:PowerShell,Data from Local System,Data from Removable Media,Data Staged:Local Data Staging,Data Transfer Size Limits,Deobfuscate/Decode Files or Information,Exfiltration Over C2 Channel,Exfiltration Over Web Service,Fallback Channels,File and Directory Discovery,Indicator Removal:File Deletion,Input Capture:Keylogging,Masquerading,Masquerading:Match Legitimate Resource Name or Location,Native API,Obfuscated Files or Information:Software Packing,Obfuscated Files or Information,Phishing:Spearphishing Attachment,Process Discovery,Screen Capture,System Binary Proxy Execution:Regsvr32,System Information Discovery,System Network Configuration Discovery,System Time Discovery,User Execution:Malicious File
S0414BabyShark[4][2][22][5][17]Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Command and Scripting Interpreter:Visual Basic,Command and Scripting Interpreter:Windows Command Shell,Data Encoding:Standard Encoding,Deobfuscate/Decode Files or Information,File and Directory Discovery,Indicator Removal:File Deletion,Ingress Tool Transfer,Input Capture:Keylogging,Process Discovery,Query Registry,Scheduled Task/Job:Scheduled Task,System Binary Proxy Execution:Mshta,System Information Discovery,System Network Configuration Discovery,System Owner/User Discovery
S0252Brave Prince[18][5]Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol,File and Directory Discovery,Impair Defenses:Disable or Modify Tools,Process Discovery,Query Registry,System Information Discovery,System Network Configuration Discovery
S0527CSPY Downloader[2]Abuse Elevation Control Mechanism:Bypass User Account Control,Application Layer Protocol:Web Protocols,Indicator Removal:File Deletion,Indicator Removal,Ingress Tool Transfer,Masquerading:Masquerade Task or Service,Modify Registry,Obfuscated Files or Information:Software Packing,Scheduled Task/Job:Scheduled Task,Subvert Trust Controls:Code Signing,User Execution:Malicious File,Virtualization/Sandbox Evasion:System Checks
S0032gh0st RAT[5][17]Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Command and Scripting Interpreter,Create or Modify System Process:Windows Service,Data Encoding:Standard Encoding,Deobfuscate/Decode Files or Information,Dynamic Resolution:Fast Flux DNS,Encrypted Channel:Symmetric Cryptography,Encrypted Channel,Hijack Execution Flow:DLL,Indicator Removal:Clear Windows Event Logs,Indicator Removal:File Deletion,Ingress Tool Transfer,Input Capture:Keylogging,Modify Registry,Native API,Non-Application Layer Protocol,Process Discovery,Process Injection,Query Registry,Screen Capture,Shared Modules,System Binary Proxy Execution:Rundll32,System Information Discovery,System Services:Service Execution
S1197GoBearGoBear is exclusively linked toKimsuky operations.[25][14]Masquerading:Match Legitimate Resource Name or Location,Proxy,Subvert Trust Controls:Code Signing
S0249Gold Dragon[18][5]Application Layer Protocol:Web Protocols,Archive Collected Data,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Command and Scripting Interpreter:Windows Command Shell,Data Staged:Local Data Staging,File and Directory Discovery,Impair Defenses:Disable or Modify Tools,Indicator Removal:File Deletion,Ingress Tool Transfer,Process Discovery,Query Registry,Software Discovery:Security Software Discovery,System Information Discovery,System Owner/User Discovery
S1198GomirGomir is uniquely associated withKimsuky operations.[14]Application Layer Protocol:Web Protocols,Command and Scripting Interpreter:Unix Shell,Create or Modify System Process:Systemd Service,Data Encoding:Standard Encoding,Encrypted Channel,Encrypted Channel:Asymmetric Cryptography,File and Directory Discovery,Indicator Removal:File Deletion,Permission Groups Discovery:Local Groups,Proxy:Internal Proxy,Remote System Discovery,Scheduled Task/Job:Cron,System Information Discovery,System Network Configuration Discovery
S0526KGH_SPY[2]Application Layer Protocol:Web Protocols,Boot or Logon Initialization Scripts:Logon Script (Windows),Command and Scripting Interpreter:Windows Command Shell,Command and Scripting Interpreter:PowerShell,Credentials from Password Stores:Credentials from Web Browsers,Credentials from Password Stores:Windows Credential Manager,Credentials from Password Stores,Data from Local System,Data Staged:Local Data Staging,Deobfuscate/Decode Files or Information,Email Collection:Local Email Collection,Exfiltration Over C2 Channel,File and Directory Discovery,Ingress Tool Transfer,Input Capture:Keylogging,Local Storage Discovery,Masquerading:Match Legitimate Resource Name or Location,Obfuscated Files or Information:Encrypted/Encoded File,Software Discovery,User Execution:Malicious File
S0002Mimikatz[7][15][5]Access Token Manipulation:SID-History Injection,Account Manipulation,Boot or Logon Autostart Execution:Security Support Provider,Credentials from Password Stores,Credentials from Password Stores:Credentials from Web Browsers,Credentials from Password Stores:Windows Credential Manager,OS Credential Dumping:DCSync,OS Credential Dumping:Security Account Manager,OS Credential Dumping:LSASS Memory,OS Credential Dumping:LSA Secrets,Rogue Domain Controller,Steal or Forge Authentication Certificates,Steal or Forge Kerberos Tickets:Golden Ticket,Steal or Forge Kerberos Tickets:Silver Ticket,Unsecured Credentials:Private Keys,Use Alternate Authentication Material:Pass the Hash,Use Alternate Authentication Material:Pass the Ticket
S0353NOKKI[22]Application Layer Protocol:Web Protocols,Application Layer Protocol:File Transfer Protocols,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Data Staged:Local Data Staging,Deobfuscate/Decode Files or Information,Indicator Removal:File Deletion,Ingress Tool Transfer,Input Capture:Credential API Hooking,Local Storage Discovery,Masquerading:Match Legitimate Resource Name or Location,Obfuscated Files or Information,System Binary Proxy Execution:Rundll32,System Information Discovery,System Network Configuration Discovery,System Owner/User Discovery,System Time Discovery
S0029PsExec[7]Create Account:Domain Account,Create or Modify System Process:Windows Service,Lateral Tool Transfer,Remote Services:SMB/Windows Admin Shares,System Services:Service Execution
S0262QuasarRAT[5][17]Abuse Elevation Control Mechanism:Bypass User Account Control,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Command and Scripting Interpreter:Windows Command Shell,Credentials from Password Stores:Credentials from Web Browsers,Credentials from Password Stores,Data from Local System,Encrypted Channel:Symmetric Cryptography,Hide Artifacts:Hidden Window,Hide Artifacts:Hidden Files and Directories,Ingress Tool Transfer,Input Capture:Keylogging,Modify Registry,Non-Application Layer Protocol,Non-Standard Port,Proxy,Remote Services:Remote Desktop Protocol,Scheduled Task/Job:Scheduled Task,Subvert Trust Controls:Code Signing,System Information Discovery,System Location Discovery,System Network Configuration Discovery,System Owner/User Discovery,Unsecured Credentials:Credentials In Files,Video Capture
S0111schtasks[2][15]Scheduled Task/Job:Scheduled Task
S1201TRANSLATEXT[23]Application Layer Protocol:Web Protocols,Browser Session Hijacking,Command and Scripting Interpreter:PowerShell,Credentials from Password Stores:Credentials from Web Browsers,Email Collection,Exfiltration Over C2 Channel,Masquerading:Match Legitimate Resource Name or Location,Modify Registry,Query Registry,Screen Capture,Software Extensions:Browser Extensions,Steal Web Session Cookie,Traffic Signaling,Web Service:Dead Drop Resolver,Web Service:Bidirectional Communication
S1196Troll StealerTroll Stealer is exclusively linked toKimsuky operations.[25][14][27]Application Layer Protocol:Web Protocols,Archive Collected Data,Browser Information Discovery,Command and Scripting Interpreter:PowerShell,Command and Scripting Interpreter:Windows Command Shell,Data Encoding:Standard Encoding,Data from Information Repositories,Data from Local System,Data Staged:Local Data Staging,Encrypted Channel:Symmetric Cryptography,Execution Guardrails:Mutual Exclusion,Exfiltration Over C2 Channel,File and Directory Discovery,Indicator Removal:File Deletion,Masquerading:Match Legitimate Resource Name or Location,Obfuscated Files or Information:Software Packing,Screen Capture,Subvert Trust Controls:Code Signing,System Binary Proxy Execution:Rundll32,System Information Discovery,System Network Configuration Discovery,Unsecured Credentials:Private Keys

References

  1. Alyac. (2019, April 3). Kimsuky Organization Steals Operation Stealth Power. Retrieved August 13, 2019.
  2. Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.
  3. Jazi, H. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved June 10, 2021.
  4. CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020.
  5. Mandiant. (2024, March 14). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved May 3, 2024.
  6. Lesnewich, G. et al. (2024, April 16). From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering. Retrieved May 3, 2024.
  7. ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019.
  8. ESTSecurity. (2019, April 17). Analysis of the APT Campaign ‘Smoke Screen’ targeting to Korea and US 출처: https://blog.alyac.co.kr/2243 [이스트시큐리티 알약 블로그]. Retrieved September 29, 2021.
  9. AhnLab. (2019, February 28). Operation Kabar Cobra - Tenacious cyber-espionage campaign by Kimsuky Group. Retrieved September 29, 2021.
  10. Microsoft Threat Intelligence. (2024, February 14). Staying ahead of threat actors in the age of AI. Retrieved March 11, 2024.
  11. Cimpanu, C.. (2018, December 5). Cyber-espionage group uses Chrome extension to infect victims. Retrieved August 26, 2019.
  12. ThreatConnect. (2020, September 28). Kimsuky Phishing Operations Putting In Work. Retrieved October 30, 2020.
  13. Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.
  14. Symantec Threat Hunter Team. (2024, May 16). Springtail: New Linux Backdoor Added to Toolkit. Retrieved January 17, 2025.
  1. KISA. (2021). Phishing Target Reconnaissance and Attack Resource Analysis Operation Muzabi. Retrieved March 8, 2024.
  2. Cimpanu, C. (2020, September 30). North Korea has tried to hack 11 officials of the UN Security Council. Retrieved November 4, 2020.
  3. Mandiant. (n.d.). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved October 14, 2024.
  4. An, J and Malhotra, A. (2021, November 10). North Korean attackers use malicious blogs to deliver malware to high-profile South Korean targets. Retrieved December 29, 2021.
  5. Den Iuzvyk, Tim Peck. (2025, February 13). Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks. Retrieved August 19, 2025.
  6. Kim, J. et al. (2019, October). KIMSUKY GROUP: TRACKING THE KING OF THE SPEAR PHISHING. Retrieved November 2, 2020.
  7. Tarakanov , D.. (2013, September 11). The “Kimsuky” Operation: A North Korean APT?. Retrieved August 13, 2019.
  8. Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.
  9. Park, S. (2024, June 27). Kimsuky deploys TRANSLATEXT to target South Korean academia. Retrieved October 14, 2024.
  10. Hossein Jazi. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved January 10, 2024.
  11. Jiho Kim & Sebin Lee, S2W. (2024, February 7). Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer (English ver.). Retrieved January 17, 2025.
  12. OpenAI. (2024, February 14). Disrupting malicious uses of AI by state-affiliated threat actors. Retrieved September 12, 2024.
  13. AhnLab ASEC. (2024, February 16). TrollAgent That Infects Systems Upon Security Program Installation Process (Kimsuky Group). Retrieved January 17, 2025.
×

[8]ページ先頭

©2009-2026 Movatter.jp