Also known as: Velvet Chollima, THALLIUM, Emerald Sleet, Black Banshee, APT43, Archipelago, SharpTongue, TA406, Springtail, TA427, Sparkling Pisces, Kimsuki, Baby Coin, Konni, APT-Q-37, Jade Sleet, Nickel Kimball, Ruby Sleet, Opal Sleet, Crooked Pisces, Cerium, Osmium
Spearphishing Attachment
Send targeted emails with malicious file attachments to gain initial access.
Spearphishing Link
Send targeted emails with malicious links to credential harvesting or exploit pages.
Valid Accounts
Use legitimate credentials to authenticate and gain access.
Drive-by Compromise
Gain access through a user visiting a compromised website during normal browsing.
Phishing
Send deceptive messages to trick victims into executing malicious content.
Exploit Public-Facing Application
Exploit vulnerabilities in internet-facing applications to gain access.
T1598.003
T1204.001
T1204.002
T1059.005
T1059.006
T1071.001
T1102
T1056.001
T1114.002
T1539
T1583.001
T1598
T1056.003
T1562.004
T1550.002
T1588.006
T1534
T1185
T1567.002
T1608.001
T1608.004
T1608.005
T1589.002
T1591
T1593
T1594
T1213
T1583.006
T1586.002
T1586.003
T1585.002
T1583.003
T1218.011
T1036.005
T1036.001
T1218.005
T1553.002
T1055.001
T1057
T1614.001
T1033
T1518.001
T1070.004
T1119
T1560.001
T1020
T1048.003
T1071.004
T1132.001
T1566.003
T1221
T1176
T1137
T1016
T1049
T1069
T1124
T1497
T1552.001
T1552.004
T1573.001
T1571
T1053.005
T1569.001
T1129
T1574.001
T1543.003
T1547.009
T1114.001
T1087.002
T1087.003
T1003.005
T1555.003
T1114.003
T1213.002
T1588.002
T1588.001
T1583.004
T1584.004
T1027.002
T1027.010
T1203
T1566.004
VBScript-based reconnaissance tool that exfiltrates system information via HTTP. Used as initial access payload in spear-phishing campaigns targeting think tanks and policy researchers.
Full-featured backdoor supporting keylogging, screenshot capture, file exfiltration, and additional module loading. Primary persistent access tool in Kimsuky campaigns.
Reconnaissance tool delivered via weaponized documents. Exfiltrates system configuration, running processes, and battery info to determine if target is worth further exploitation.
Malicious Chromium browser extension that reads email directly from the victim's webmail (Gmail, AOL, Yahoo). Bypasses 2FA since it operates within the authenticated browser session.
Multi-component backdoor that uses a dedicated module for stealing credentials. Operates with a dropper, injector, and payload architecture for modular deployment.
PowerShell-based reconnaissance and data collection tool. Gathers system info, installed programs, recent documents, and sends data to attacker-controlled cloud services.
VBScript info-stealer that collects file listings from specific directories. Targets document files to identify intelligence value before deploying heavier payloads.
Android spyware disguised as a security plugin. Captures SMS, call logs, GPS location, and can exfiltrate files from the device. Targets South Korean mobile users.
Abused as C2 channel — malware uploads stolen data to attacker-controlled Google Drive accounts and retrieves commands from shared documents.
Used as file exfiltration channel, with stolen documents and credentials uploaded to attacker-controlled OneDrive accounts to blend with normal cloud traffic.
Used for command-and-control communication, storing encoded commands and receiving exfiltrated data through the Dropbox API.
Used extensively for executing encoded reconnaissance scripts, downloading secondary payloads, and credential harvesting from browser stores.
HTML Application host abused to execute HTA files containing VBScript or JScript payloads, bypassing application whitelisting controls.
Abused for persistent remote access after initial compromise. Legitimate Google tool that's difficult for defenders to distinguish from authorized usage.
Open-source .NET RAT used as a lightweight remote access tool in some Kimsuky campaigns, providing screen control, file management, and keylogging.
Remote access trojan with keylogging and screen capture capabilities
Information stealer targeting browser credentials and email data
Legitimate Metasploit Framework payload used by Kimsuky for post-exploitation
Second-stage malware with command execution capabilities
Malware designed to steal clipboard data including cryptocurrency wallet addresses
PowerShell-based backdoor with command execution and file manipulation capabilities
Credential harvesting tool targeting webmail and social media accounts
Python-based backdoor with keylogging and screenshot capabilities
Remote access trojan with keylogging and screen capture functionality
Windows backdoor delivered through spear-phishing campaigns
Malicious downloader distributed via malicious CHM files
Cloud-based RAT using legitimate cloud services for C2
Variant of AppleSeed backdoor with enhanced capabilities
Commodity botnet malware adopted by Kimsuky for credential theft
Credential and browser data stealer
Generic information stealer targeting browser credentials and system information
Legitimate proxy tool abused for network tunneling
Remote access trojan used for surveillance and data collection operations, capable of keylogging and screenshot capture.
Custom backdoor used in targeted campaigns against defense and government sectors with advanced evasion techniques.
Open-source remote access trojan adopted by Kimsuky for remote control operations
Multi-stage backdoor capable of keylogging, screenshot capture, and file exfiltration. Often deployed alongside AppleSeed.
Email exfiltration tool designed to steal credentials and email content from victims' accounts.
Malware capable of keylogging, screenshot capture, and arbitrary file upload/download functionality.
| Type | Value |
|---|---|
| domain | bigfile[.]pe[.]hu |
| domain | mybobo[.]mygamesonline[.]org |
| ip | 27[.]102[.]114[.]89 |
| ip | 158[.]247[.]222[.]165 |
| hash | 7d0e57a3c12a8e7c0f16e52b3a6e0d5e |
| ip | 27[.]102[.]137[.]181 |
| ip | 158[.]247[.]215[.]121 |
| ip | 158[.]247[.]204[.]137 |
| ip | 158[.]247[.]192[.]226 |
| ip | 158[.]247[.]242[.]206 |
| domain | kzloly[.]nmailhub[.]com |
| hash | 10c3b3ab2e9cb618fc938028c9295ad5bdb1d836b8f07d65c0d3036dbc18bbb4 |
| hash | 509fb00b9d6eaa74f54a3d1f092a161a095e5132d80cc9cc95c184d4e258525b |
| domain | naver[.]kro[.]kr |
| domain | daum[.]kro[.]kr |
| domain | myaccount-help[.]com |
| domain | appleid-unlock[.]com |
| hash | 4c3499f3cc4a4fdc7e67c5e45eb1e93b4e5e5e2e1e0e3c1e9b9c8f7e6d5c4b3a |
| domain | auth-sso[.]com |
| ip | 185[.]244[.]39[.]224 |
| domain | myaccounts-naver[.]com |
| domain | myaccount-google[.]com |
| domain | naver-account[.]com |
| hash | 7d7e3e1a5b6c9c4e2f3a1b5d8c9e4f2a3b7c8d9e1f2a3b4c5d6e7f8a9b0c1d2 |
| domain | read-naver-notice[.]com |
| domain | naver[.]hxtvvl[.]com |
| domain | daum[.]hxtvvl[.]com |
| domain | dhlone[.]com |
| hash | a9b8c7d6e5f4a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6 |
| domain | account-pprotection[.]com |
| domain | naver-security[.]com |
| domain | daum-security[.]com |
| domain | myaccount-recovery[.]com |
| hash | 5d3f8e7a5f25f42b8e49a3c7e6c1f3b4e7a5b2c8d9e1f2a3b4c5d6e7f8a9b0c1 |
| hash | a7b3c5d9e1f2a4b6c8d0e2f4a6b8c0d2e4f6a8b0c2d4e6f8a0b2c4d6e8f0a2b4 |
| ip | 116[.]202[.]99[.]218 |
| ip | 27[.]255[.]81[.]107 |
| ip | 149[.]28[.]139[.]62 |
| ip | 154[.]216[.]177[.]215 |
| hash | c0866bb72c7a12a0288f434e16ba14eeaa35d3c4cff4a86046c553c15679c0b5 |
| domain | quickcon[.]store |
| domain | naver[.]koreagov[.]eu |
| domain | read[.]naver[.]koreagov[.]eu |
| domain | myaccount[.]daum[.]koreagov[.]eu |
| domain | account[.]daum[.]koreagov[.]eu |
| hash | 5c7f6b8e9a2d1f3e4c8b7a6d5e4f3a2b1c9d8e7f6a5b4c3d2e1f0a9b8c7d6e5f |
| domain | bigfile[.]cloud-server[.]org |
| domain | cdn[.]ms-teams[.]live |
| domain | mybonus[.]live |
| domain | naver[.]linkpc[.]net |
| domain | account-notificationss[.]com |
| domain | mailcloudsessionid[.]com |
| hash | 8c3e2ea5db3e8c0f3c8f5a5d4c3f2b1e9a8d7c6b5a4d3c2b1a9e8d7c6b5a4d3c |
| domain | naver[.]onegoogle[.]kr |
| domain | member-notice[.]com |
| domain | read-naver[.]com |
| domain | hanmail[.]com-notice[.]com |
| hash | 8c2f5b3c7d4e6f1a9b8c7d6e5f4a3b2c1d0e9f8a7b6c5d4e3f2a1b0c9d8e7f6a |
| hash | 7f3e8d9c2a1b0c9d8e7f6a5b4c3d2e1f0a9b8c7d6e5f4a3b2c1d0e9f8a7b6c5d |
| domain | member-authorize[.]com |
| domain | myaccount-authorize[.]com |
| domain | read-hanmail[.]net |
| Domain / Host | Status |
|---|---|
bigfile[.]pe[.]huC2 domain used in South Korean government targeting | offline |
mybobo[.]mygamesonline[.]orgBabyShark C2 infrastructure | offline |
27[.]102[.]114[.]89Infrastructure linked to AppleSeed campaigns | offline |
158[.]247[.]222[.]165ReconShark C2 server | active |
kzloly[.]nmailhub[.]com | offline |
quickcon[.]store | unknown |
Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.
MITRE ATT&CK - Kimsuky
https://attack.mitre.org/groups/G0094/
CISA - North Korean State-Sponsored Cyber Actors Use Social Engineering to Enable Hacking
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-152a
Mandiant - APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations
https://www.mandiant.com/resources/apt43-north-korea-cybercrime-espionage
FBI Flash Alert: North Korean Actors Use Malicious QR Codes (Quishing)
https://thehackernews.com/2026/01/fbi-warns-north-korean-hackers-using.html
Kimsuky Spreads DocSwap Android Malware via QR Phishing
https://thehackernews.com/2025/12/kimsuky-spreads-docswap-android-malware.html
GenDigital: DPRK's Playbook - Kimsuky's HttpTroy and Lazarus BLINDINGCAN
https://www.gendigital.com/blog/insights/research/dprk-kimsuky-lazarus-analysis
ENKI: Kimsuky's Ongoing Evolution of KimJongRAT
https://securityonline.info/kimsuky-apt-deploys-dual-kimjongrat-payloads-switching-between-pe-powershell-based-on-windows-defender-status/
Kimsuky APT Exposed: June 2025 Data Leak Analysis
https://gbhackers.com/kimsuky-apt-exposed/
Microsoft: Emerald Sleet Uses ClickFix Tactic
https://www.helpnetsecurity.com/2025/02/13/north-korean-hackers-spotted-using-clickfix-tactic-to-deliver-malware/
Proofpoint: TA427's Art of Information Gathering and DMARC Abuse
https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering
AhnLab: Larva-24005 Campaign Exploits BlueKeep RDP Vulnerability
https://securityaffairs.com/186755/intelligence/north-korea-linked-apt-kimsuky-behind-quishing-attacks-fbi-warns.html
STOLEN PENCIL Campaign Targets Academia
https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia
Kimsuky APT continues to target South Korean government using AppleSeed backdoor
https://blog.malwarebytes.com/threat-intelligence/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/
Kimsuky's GoldDragon cluster and its C2 operations
https://www.sentinelone.com/labs/kimsuky-golddragon-cluster/
North Korean Kimsuky APT Targets Journalists
https://www.proofpoint.com/us/blog/threat-insight/north-korean-kimsuky-apt-targets-journalists
APT43: North Korean Group Combines Cybercrime and Espionage
https://cloud.google.com/blog/topics/threat-intelligence/apt43-north-korea-cybercrime-espionage
KIMSUKY's GoldDragon cluster and its C2 operations
https://securelist.com/kimsukys-golddragon-cluster/107258/
KIMSUKY APT continues to target South Korean government using AppleSeed backdoor
https://www.malwarebytes.com/blog/news/2023/01/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor
Kimsuky's New Social Engineering Campaign
https://www.sentinelone.com/labs/kimsuky-new-social-engineering-campaign/
APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations
https://www.mandiant.com/resources/blog/apt43-north-korea-cybercrime-espionage
KIMSUKY - Fast and Furious: North Korean APT Targets Defense Research with New Tactics
https://www.sentinelone.com/labs/kimsuky-fast-and-furious/
Kimsuky APT continues to target South Korean government using AppleSeed backdoor
https://www.malwarebytes.com/blog/threat-intelligence/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor
North Korea's Kimsuky APT Keeps Up Pressure Against South Korea
https://www.darkreading.com/cyberattacks-data-breaches/north-korea-kimsuky-apt-keeps-up-pressure-against-south-korea
Kimsuky Targeting Academic Researchers and Think Tanks
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-301a
Kimsuky APT continues to target South Korean government using AppleSeed backdoor
https://blog.alyac.co.kr/category/malware-information/
Kimsuky Group: Tracking the King of Spear Phishing
https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/
North Korean Kimsuky APT continues to target South Korea
https://www.sentinelone.com/labs/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/
CISA AA23-032A: #StopRansomware: Kimsuky
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-032a
Microsoft: THALLIUM targets government organizations
https://www.microsoft.com/en-us/security/blog/2019/12/30/microsoft-works-to-protect-customers-from-thallium/
AhnLab: Kimsuky Group's APT Campaign Using Multi-Stage Binary Infection
https://asec.ahnlab.com/en/49525/
New Kimsuky Malware EndClient RAT: First Technical Report and IOCs
https://www.0x0v1.com/endclientrat/
Kimsuky Exploits BlueKeep RDP Vulnerability (CVE-2019-0708) - Larva-24005 Campaign
https://thehackernews.com/2025/04/kimsuky-exploits-bluekeep-rdp.html
DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks
https://thehackernews.com/2026/04/dprk-linked-hackers-use-github-as-c2-in.html
Exposed Kim Dump Exposes Kimsuky Hackers New Tactics and Infrastructure
https://teamwin.in/exposed-kim-dump-exposes-kimsuky-hackers-new-tactics-techniques-and-infrastructure/
Inside DPRK Operations: New Lazarus and Kimsuky Infrastructure Uncovered
https://hunt.io/blog
The Coordinated Embassy Hunt: DPRK-linked GitHub C2 Espionage Campaign
https://www.trellix.com/blogs/research/dprk-linked-github-c2-espionage-campaign/
Kimsuky APT continues to target South Korean government using AppleSeed backdoor
https://www.malwarebytes.com/blog/news/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor
DPRK Cyber Group Kimsuky Deploying New Reconnaissance Tools
https://www.sentinelone.com/labs/dprk-cyber-group-kimsuky-deploying-new-reconnaissance-tools/
North Korean APT Kimsuky Targets South Korean Government with Chrome Extension
https://www.ahnlab.com/global/en/site/securityinfo/secunews/secuNewsView.do?seq=32446
CISA Alert: AppleSeed Malware Used by Kimsuky
https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-208a
Google TAG: North Korean Actors Target Security Researchers
https://blog.google/threat-analysis-group/north-korean-actors-target-security-researchers/
AhnLab: Analysis of Kimsuky Group's APT Attacks Disguised as Korean Language Questionnaires
https://asec.ahnlab.com/en/32828/
Microsoft: Springtail North Korean Threat Actor Targets Government Organizations
https://www.microsoft.com/en-us/security/blog/2021/11/18/iranian-targeting-of-it-sector-signals-continued-trend/
Kimsuky APT continues to target South Korean government using AppleSeed backdoor
https://www.malwarebytes.com/blog/threat-intelligence/2024/01/kimsuky-apt-continues-to-target-south-korean-government
ANSSI: Kimsuky Group Tracking
https://www.cert.ssi.gouv.fr/cti/CERTFR-2021-CTI-009/
AhnLab: Kimsuky Group's Continued Activity Targeting Korea
https://asec.ahnlab.com/en/category/threat-actor/kimsuky/
Kimsuky APT continues to target South Korean government using AppleSeed backdoor
https://www.malwarebytes.com/blog/threat-intelligence/2021/06/kimsuky-apt-continues-to-target-south-korea-using-appleseed-backdoor
Kimsuky Group: Tracking the King of Spear Phishing
https://www.sentinelone.com/labs/kimsuky-group-tracking-the-king-of-spear-phishing/
North Korea's Kimsuky APT Weaponizes Blogs for C2
https://www.darkreading.com/cyberattacks-data-breaches/north-korea-kimsuky-apt-weaponizes-blogs-c2
Microsoft - THALLIUM: Detecting a nation-state campaign
https://www.microsoft.com/en-us/security/blog/2019/12/12/thallium-detecting-a-nation-state-campaign/
CERT-NZ Advisory - Kimsuky Group: North Korean Cyber Activity
https://www.cert.govt.nz/it-specialists/advisories/kimsuky-group-north-korean-cyber-activity/
AhnLab ASEC - Kimsuky Group's APT Attacks Using Cloud Services
https://asec.ahnlab.com/en/19352/