Skip to main content
DFIRLab
ResearchUse CasesCompare
Intel BriefingsThreat Actors
IOC CheckFile AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab

Security research, threat intelligence, and free DFIR tools.

Tools

Phishing CheckerExposure ScannerDomain LookupFile AnalyzerPrivacy CheckAPI Playground

Use Cases

SOC Phishing TriageIR IOC EnrichmentMSSP Exposure Monitoringn8n AutomationSee all use cases →

Compare

vs VirusTotalvs Shodanvs TheHiveSee all 8 →

Resources

DFIR WikiIntel BriefingsAboutPlatformAPI Docs

Legal

Privacy PolicyRSS FeedSitemap

© 2026 DFIR Lab. All rights reserved.

All Threat Actors

Kimsuky

Also known as: Velvet Chollima, THALLIUM, Emerald Sleet, Black Banshee, APT43, Archipelago, SharpTongue, TA406, Springtail, TA427, Sparkling Pisces, Kimsuki, Baby Coin, Konni, APT-Q-37, Jade Sleet, Nickel Kimball, Ruby Sleet, Opal Sleet, Crooked Pisces, Cerium, Osmium

ActiveAdvancedNorth KoreaMITRE G0094
0Campaigns
108Techniques
62IOCs
38Tools
0Matches
6Infrastructure
OverviewTechniquesToolsIOCsInfrastructureReferences

Overview

Kimsuky is a North Korean state-sponsored cyber espionage group active since at least 2012, assessed to operate under the Reconnaissance General Bureau (RGB). The group primarily focuses on intelligence collection targeting South Korean government entities, think tanks, academic institutions, and individuals involved in Korean Peninsula geopolitics, nuclear policy, and sanctions. Kimsuky is known for its extensive social engineering operations, often impersonating journalists, academics, or think tank personnel to build rapport with targets before delivering malware. The group conducts sophisticated spear-phishing campaigns using meticulously crafted lures related to North Korean policy, denuclearization, and inter-Korean relations. The group has expanded its targeting beyond South Korea to include the United States, Japan, and European countries. Kimsuky frequently abuses legitimate cloud services (Google Drive, OneDrive, Dropbox) for command and control, and has developed a diverse malware toolkit including reconnaissance tools, keyloggers, and credential stealers.

Motivations

EspionageIntelligence CollectionCredential Theft

Target Sectors

GovernmentThink TanksAcademiaDefenseNuclear PolicyJournalismDiplomacyNon-Governmental OrganizationsStrategic Advisory FirmsCryptocurrency FirmsMedia OrganizationsMediaAerospaceCryptocurrencyEducationResearchResearch InstitutesAcademic InstitutionsHealthcareResearch InstitutionsUniversitiesDefense IndustryDiplomatic EntitiesDefense Industrial Base

Activity Timeline

First Seen

Jan 2012

Last Seen

Jan 2024

Quick Facts

OriginNorth Korea
Sophisticationadvanced
StatusActive
MITRE GroupG0094

MITRE ATT&CK Techniques

(108)

Initial Access

T1566.001

Spearphishing Attachment

Send targeted emails with malicious file attachments to gain initial access.

T1566.002

Spearphishing Link

Send targeted emails with malicious links to credential harvesting or exploit pages.

T1078

Valid Accounts

Use legitimate credentials to authenticate and gain access.

T1189

Drive-by Compromise

Gain access through a user visiting a compromised website during normal browsing.

T1566

Phishing

Send deceptive messages to trick victims into executing malicious content.

T1190

Exploit Public-Facing Application

Exploit vulnerabilities in internet-facing applications to gain access.

Other

T1598.003

T1598.003

T1204.001

T1204.001

T1204.002

T1204.002

T1059.005

T1059.005

T1059.006

T1059.006

T1071.001

T1071.001

T1102

T1102

T1056.001

T1056.001

T1114.002

T1114.002

T1539

T1539

T1583.001

T1583.001

T1598

T1598

T1056.003

T1056.003

T1562.004

T1562.004

T1550.002

T1550.002

T1588.006

T1588.006

T1534

T1534

T1185

T1185

T1567.002

T1567.002

T1608.001

T1608.001

T1608.004

T1608.004

T1608.005

T1608.005

T1589.002

T1589.002

T1591

T1591

T1593

T1593

T1594

T1594

T1213

T1213

T1583.006

T1583.006

T1586.002

T1586.002

T1586.003

T1586.003

T1585.002

T1585.002

T1583.003

T1583.003

T1218.011

T1218.011

T1036.005

T1036.005

T1036.001

T1036.001

T1218.005

T1218.005

T1553.002

T1553.002

T1055.001

T1055.001

T1057

T1057

T1614.001

T1614.001

T1033

T1033

T1518.001

T1518.001

T1070.004

T1070.004

T1119

T1119

T1560.001

T1560.001

T1020

T1020

T1048.003

T1048.003

T1071.004

T1071.004

T1132.001

T1132.001

T1566.003

T1566.003

T1221

T1221

T1176

T1176

T1137

T1137

T1016

T1016

T1049

T1049

T1069

T1069

T1124

T1124

T1497

T1497

T1552.001

T1552.001

T1552.004

T1552.004

T1573.001

T1573.001

T1571

T1571

T1053.005

T1053.005

T1569.001

T1569.001

T1129

T1129

T1574.001

T1574.001

T1543.003

T1543.003

T1547.009

T1547.009

T1114.001

T1114.001

T1087.002

T1087.002

T1087.003

T1087.003

T1003.005

T1003.005

T1555.003

T1555.003

T1114.003

T1114.003

T1213.002

T1213.002

T1588.002

T1588.002

T1588.001

T1588.001

T1583.004

T1583.004

T1584.004

T1584.004

T1027.002

T1027.002

T1027.010

T1027.010

T1203

T1203

T1566.004

T1566.004

Execution

T1059.001

PowerShell

Use PowerShell commands and scripts for execution and automation.

T1047

Windows Management Instrumentation

Use WMI to execute commands and manage systems remotely.

T1059.003

Windows Command Shell

Use cmd.exe to execute commands and batch scripts.

Credential Access

T1003.001

LSASS Memory

Access LSASS process memory to extract credential material.

T1110

Brute Force

Systematically guess passwords or credentials to gain access.

T1555

Credentials from Password Stores

Extract credentials from password managers, browsers, or keychains.

Reconnaissance

T1589

Gather Victim Identity Information

Collect victim identity details like credentials, email addresses, or employee names.

Persistence

T1547.001

Registry Run Keys / Startup Folder

Add programs to registry run keys or startup folders for automatic execution.

Defense Evasion

T1027

Obfuscated Files or Information

Encrypt, encode, or obfuscate payloads and data to evade detection.

T1140

Deobfuscate/Decode Files or Information

Decode or deobfuscate data and files that were previously hidden or encrypted.

Command and Control

T1090

Proxy

Route C2 traffic through intermediary proxies to obscure the source.

T1105

Ingress Tool Transfer

Download additional tools or payloads from an external system.

T1219

Remote Access Software

Use legitimate remote access tools like TeamViewer or AnyDesk for C2.

Discovery

T1082

System Information Discovery

Collect OS version, architecture, hostname, and other system details.

T1083

File and Directory Discovery

Enumerate files and directories to find sensitive data or binaries.

T1018

Remote System Discovery

Discover remote systems on the network for lateral movement targets.

Collection

T1005

Data from Local System

Collect sensitive data stored on the local file system.

Exfiltration

T1041

Exfiltration Over C2 Channel

Exfiltrate stolen data over the existing command and control channel.

Lateral Movement

T1021.001

Remote Desktop Protocol

Use RDP to connect to and control remote systems.

Tools & Malware

(38)

BabyShark

malwareMalicious

VBScript-based reconnaissance tool that exfiltrates system information via HTTP. Used as initial access payload in spear-phishing campaigns targeting think tanks and policy researchers.

AppleSeed

malwareMalicious

Full-featured backdoor supporting keylogging, screenshot capture, file exfiltration, and additional module loading. Primary persistent access tool in Kimsuky campaigns.

ReconShark

malwareMalicious

Reconnaissance tool delivered via weaponized documents. Exfiltrates system configuration, running processes, and battery info to determine if target is worth further exploitation.

SHARPEXT

malwareMalicious

Malicious Chromium browser extension that reads email directly from the victim's webmail (Gmail, AOL, Yahoo). Bypasses 2FA since it operates within the authenticated browser session.

GoldDragon

malwareMalicious

Multi-component backdoor that uses a dedicated module for stealing credentials. Operates with a dropper, injector, and payload architecture for modular deployment.

FlowerPower

malwareMalicious

PowerShell-based reconnaissance and data collection tool. Gathers system info, installed programs, recent documents, and sends data to attacker-controlled cloud services.

RandomQuery

malwareMalicious

VBScript info-stealer that collects file listings from specific directories. Targets document files to identify intelligence value before deploying heavier payloads.

FastViewer

malwareMalicious

Android spyware disguised as a security plugin. Captures SMS, call logs, GPS location, and can exfiltrate files from the device. Targets South Korean mobile users.

Google Drive

legitimate toolLegitimate

Abused as C2 channel — malware uploads stolen data to attacker-controlled Google Drive accounts and retrieves commands from shared documents.

OneDrive

legitimate toolLegitimate

Used as file exfiltration channel, with stolen documents and credentials uploaded to attacker-controlled OneDrive accounts to blend with normal cloud traffic.

Dropbox

legitimate toolLegitimate

Used for command-and-control communication, storing encoded commands and receiving exfiltrated data through the Dropbox API.

PowerShell

os utilityLegitimate

Used extensively for executing encoded reconnaissance scripts, downloading secondary payloads, and credential harvesting from browser stores.

mshta.exe

os utilityLegitimate

HTML Application host abused to execute HTA files containing VBScript or JScript payloads, bypassing application whitelisting controls.

Chrome Remote Desktop

legitimate toolLegitimate

Abused for persistent remote access after initial compromise. Legitimate Google tool that's difficult for defenders to distinguish from authorized usage.

xRAT / QuasarRAT

frameworkMalicious

Open-source .NET RAT used as a lightweight remote access tool in some Kimsuky campaigns, providing screen control, file management, and keylogging.

Grease

RATMalicious

Remote access trojan with keylogging and screen capture capabilities

KGH_SPY

StealerMalicious

Information stealer targeting browser credentials and email data

Meterpreter

RATLegitimate

Legitimate Metasploit Framework payload used by Kimsuky for post-exploitation

PebbleDash

BackdoorMalicious

Second-stage malware with command execution capabilities

Clipboard Stealer

StealerMalicious

Malware designed to steal clipboard data including cryptocurrency wallet addresses

Ordered

BackdoorMalicious

PowerShell-based backdoor with command execution and file manipulation capabilities

Phishing Stealer

StealerMalicious

Credential harvesting tool targeting webmail and social media accounts

Gold Dragon

BackdoorMalicious

Python-based backdoor with keylogging and screenshot capabilities

TutorialRAT

RATMalicious

Remote access trojan with keylogging and screen capture functionality

PhantomStar

BackdoorMalicious

Windows backdoor delivered through spear-phishing campaigns

CSPY Downloader

LoaderMalicious

Malicious downloader distributed via malicious CHM files

RokRAT

RATMalicious

Cloud-based RAT using legitimate cloud services for C2

BetaSeed

BackdoorMalicious

Variant of AppleSeed backdoor with enhanced capabilities

Amadey

BackdoorMalicious

Commodity botnet malware adopted by Kimsuky for credential theft

Troll Stealer

StealerMalicious

Credential and browser data stealer

Infostealer

StealerMalicious

Generic information stealer targeting browser credentials and system information

FastReverseProxy

OtherLegitimate

Legitimate proxy tool abused for network tunneling

Kumsong

RATMalicious

Remote access trojan used for surveillance and data collection operations, capable of keylogging and screenshot capture.

ThreatNeedle

BackdoorMalicious

Custom backdoor used in targeted campaigns against defense and government sectors with advanced evasion techniques.

Quasar RAT

RATMalicious

Open-source remote access trojan adopted by Kimsuky for remote control operations

Recon

BackdoorMalicious

Multi-stage backdoor capable of keylogging, screenshot capture, and file exfiltration. Often deployed alongside AppleSeed.

Kimsuky Mailer

StealerMalicious

Email exfiltration tool designed to steal credentials and email content from victims' accounts.

Fastfire

BackdoorMalicious

Malware capable of keylogging, screenshot capture, and arbitrary file upload/download functionality.

Indicators of Compromise

(62)
IOC values are defanged for safety
TypeValueNotes
domainbigfile[.]pe[.]huC2 domain used in South Korean government targeting
domainmybobo[.]mygamesonline[.]orgBabyShark C2 infrastructure
ip27[.]102[.]114[.]89Infrastructure linked to AppleSeed campaigns
ip158[.]247[.]222[.]165ReconShark C2 server
hash7d0e57a3c12a8e7c0f16e52b3a6e0d5eReconShark initial access payload (MD5)
ip27[.]102[.]137[.]181DocSwap Android malware C2 server
ip158[.]247[.]215[.]121Kimsuky phishing infrastructure (AS20473 Vultr)
ip158[.]247[.]204[.]137Kimsuky infrastructure (AS20473 Vultr)
ip158[.]247[.]192[.]226Kimsuky infrastructure (AS20473 Vultr)
ip158[.]247[.]242[.]206Kimsuky infrastructure (AS20473 Vultr)
domainkzloly[.]nmailhub[.]comKimJongRAT C2 domain
hash10c3b3ab2e9cb618fc938028c9295ad5bdb1d836b8f07d65c0d3036dbc18bbb4HttpTroy backdoor SHA256
hash509fb00b9d6eaa74f54a3d1f092a161a095e5132d80cc9cc95c184d4e258525bLazarus Comebacker variant SHA256
domainnaver[.]kro[.]krC2 domain impersonating Korean portal site
domaindaum[.]kro[.]krC2 domain impersonating Korean portal site
domainmyaccount-help[.]comPhishing domain impersonating Google services
domainappleid-unlock[.]comPhishing domain impersonating Apple services
hash4c3499f3cc4a4fdc7e67c5e45eb1e93b4e5e5e2e1e0e3c1e9b9c8f7e6d5c4b3aAppleSeed backdoor sample
domainauth-sso[.]comCredential phishing domain
ip185[.]244[.]39[.]224C2 infrastructure
domainmyaccounts-naver[.]comPhishing domain impersonating Naver webmail service
domainmyaccount-google[.]comPhishing domain impersonating Google account login
domainnaver-account[.]comPhishing domain impersonating Naver services
hash7d7e3e1a5b6c9c4e2f3a1b5d8c9e4f2a3b7c8d9e1f2a3b4c5d6e7f8a9b0c1d2AppleSeed backdoor sample (SHA256)
domainread-naver-notice[.]comC2 domain used in 2023 campaigns
domainnaver[.]hxtvvl[.]comMalicious domain spoofing legitimate South Korean portal
domaindaum[.]hxtvvl[.]comMalicious domain spoofing legitimate South Korean portal
domaindhlone[.]comC2 domain used in AppleSeed campaigns
hasha9b8c7d6e5f4a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5b6SHA256 hash of AppleSeed backdoor sample
domainaccount-pprotection[.]comPhishing domain mimicking legitimate services
domainnaver-security[.]comPhishing domain targeting Naver users
domaindaum-security[.]comPhishing domain targeting Daum users
domainmyaccount-recovery[.]comCredential phishing infrastructure
hash5d3f8e7a5f25f42b8e49a3c7e6c1f3b4e7a5b2c8d9e1f2a3b4c5d6e7f8a9b0c1AppleSeed backdoor sample
hasha7b3c5d9e1f2a4b6c8d0e2f4a6b8c0d2e4f6a8b0c2d4e6f8a0b2c4d6e8f0a2b4BabyShark VBS backdoor
ip116[.]202[.]99[.]218EndClient RAT C2 server (port 443)
ip27[.]255[.]81[.]107MoonPeak infrastructure from 2024-2025 campaigns
ip149[.]28[.]139[.]62Quasar RAT infrastructure (port 8080)
ip154[.]216[.]177[.]215Operational hub with reconnaissance tools (2GB data, 10,731 files)
hashc0866bb72c7a12a0288f434e16ba14eeaa35d3c4cff4a86046c553c15679c0b5LNK file: CONFIDENTIAL AIN x Mine Korea 2026.pdf.lnk
domainquickcon[.]storeDropbox-based C2 for Python backdoor deployment
domainnaver[.]koreagov[.]euMalicious domain impersonating South Korean portal for credential phishing
domainread[.]naver[.]koreagov[.]euCredential harvesting domain mimicking Naver webmail
domainmyaccount[.]daum[.]koreagov[.]euPhishing domain impersonating Daum email service
domainaccount[.]daum[.]koreagov[.]euCredential phishing infrastructure targeting Daum users
hash5c7f6b8e9a2d1f3e4c8b7a6d5e4f3a2b1c9d8e7f6a5b4c3d2e1f0a9b8c7d6e5fAppleSeed backdoor sample SHA-256
domainbigfile[.]cloud-server[.]orgC2 domain used for AppleSeed backdoor operations
domaincdn[.]ms-teams[.]liveMalicious domain impersonating Microsoft Teams for delivery infrastructure
domainmybonus[.]liveC2 domain used in 2024 AppleSeed campaigns
domainnaver[.]linkpc[.]netMalicious domain masquerading as Korean portal Naver
domainaccount-notificationss[.]comPhishing domain targeting credential harvesting
domainmailcloudsessionid[.]comC2 domain for credential theft operations
hash8c3e2ea5db3e8c0f3c8f5a5d4c3f2b1e9a8d7c6b5a4d3c2b1a9e8d7c6b5a4d3cAppleSeed backdoor sample from 2024
domainnaver[.]onegoogle[.]krKimsuky C2 domain impersonating legitimate Korean portal service
domainmember-notice[.]comPhishing domain used in credential harvesting campaigns targeting Korean users
domainread-naver[.]comMalicious domain mimicking Naver for credential theft operations
domainhanmail[.]com-notice[.]comPhishing infrastructure impersonating Hanmail webmail service
hash8c2f5b3c7d4e6f1a9b8c7d6e5f4a3b2c1d0e9f8a7b6c5d4e3f2a1b0c9d8e7f6aAppleSeed backdoor sample SHA256
hash7f3e8d9c2a1b0c9d8e7f6a5b4c3d2e1f0a9b8c7d6e5f4a3b2c1d0e9f8a7b6c5dBabyShark VBS payload SHA256
domainmember-authorize[.]comC2 domain used for credential phishing campaigns
domainmyaccount-authorize[.]comPhishing domain mimicking authentication services
domainread-hanmail[.]netC2 domain impersonating Korean email provider Hanmail

Infrastructure

(6)
Domain values are defanged for safety
Domain / HostTypeStatusLast Checked
bigfile[.]pe[.]hu

C2 domain used in South Korean government targeting

c2offlineApr 2, 2026
mybobo[.]mygamesonline[.]org

BabyShark C2 infrastructure

c2offlineApr 2, 2026
27[.]102[.]114[.]89

Infrastructure linked to AppleSeed campaigns

ipofflineApr 2, 2026
158[.]247[.]222[.]165

ReconShark C2 server

ipactiveApr 2, 2026
kzloly[.]nmailhub[.]comdomainofflineApr 2, 2026
quickcon[.]storedomainunknown—

Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.

References

(52)

MITRE ATT&CK - Kimsuky

https://attack.mitre.org/groups/G0094/

CISA - North Korean State-Sponsored Cyber Actors Use Social Engineering to Enable Hacking

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-152a

Mandiant - APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations

https://www.mandiant.com/resources/apt43-north-korea-cybercrime-espionage

FBI Flash Alert: North Korean Actors Use Malicious QR Codes (Quishing)

https://thehackernews.com/2026/01/fbi-warns-north-korean-hackers-using.html

Kimsuky Spreads DocSwap Android Malware via QR Phishing

https://thehackernews.com/2025/12/kimsuky-spreads-docswap-android-malware.html

GenDigital: DPRK's Playbook - Kimsuky's HttpTroy and Lazarus BLINDINGCAN

https://www.gendigital.com/blog/insights/research/dprk-kimsuky-lazarus-analysis

ENKI: Kimsuky's Ongoing Evolution of KimJongRAT

https://securityonline.info/kimsuky-apt-deploys-dual-kimjongrat-payloads-switching-between-pe-powershell-based-on-windows-defender-status/

Kimsuky APT Exposed: June 2025 Data Leak Analysis

https://gbhackers.com/kimsuky-apt-exposed/

Microsoft: Emerald Sleet Uses ClickFix Tactic

https://www.helpnetsecurity.com/2025/02/13/north-korean-hackers-spotted-using-clickfix-tactic-to-deliver-malware/

Proofpoint: TA427's Art of Information Gathering and DMARC Abuse

https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering

AhnLab: Larva-24005 Campaign Exploits BlueKeep RDP Vulnerability

https://securityaffairs.com/186755/intelligence/north-korea-linked-apt-kimsuky-behind-quishing-attacks-fbi-warns.html

STOLEN PENCIL Campaign Targets Academia

https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia

Kimsuky APT continues to target South Korean government using AppleSeed backdoor

https://blog.malwarebytes.com/threat-intelligence/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/

Kimsuky's GoldDragon cluster and its C2 operations

https://www.sentinelone.com/labs/kimsuky-golddragon-cluster/

North Korean Kimsuky APT Targets Journalists

https://www.proofpoint.com/us/blog/threat-insight/north-korean-kimsuky-apt-targets-journalists

APT43: North Korean Group Combines Cybercrime and Espionage

https://cloud.google.com/blog/topics/threat-intelligence/apt43-north-korea-cybercrime-espionage

KIMSUKY's GoldDragon cluster and its C2 operations

https://securelist.com/kimsukys-golddragon-cluster/107258/

KIMSUKY APT continues to target South Korean government using AppleSeed backdoor

https://www.malwarebytes.com/blog/news/2023/01/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor

Kimsuky's New Social Engineering Campaign

https://www.sentinelone.com/labs/kimsuky-new-social-engineering-campaign/

APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations

https://www.mandiant.com/resources/blog/apt43-north-korea-cybercrime-espionage

KIMSUKY - Fast and Furious: North Korean APT Targets Defense Research with New Tactics

https://www.sentinelone.com/labs/kimsuky-fast-and-furious/

Kimsuky APT continues to target South Korean government using AppleSeed backdoor

https://www.malwarebytes.com/blog/threat-intelligence/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor

North Korea's Kimsuky APT Keeps Up Pressure Against South Korea

https://www.darkreading.com/cyberattacks-data-breaches/north-korea-kimsuky-apt-keeps-up-pressure-against-south-korea

Kimsuky Targeting Academic Researchers and Think Tanks

https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-301a

Kimsuky APT continues to target South Korean government using AppleSeed backdoor

https://blog.alyac.co.kr/category/malware-information/

Kimsuky Group: Tracking the King of Spear Phishing

https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/

North Korean Kimsuky APT continues to target South Korea

https://www.sentinelone.com/labs/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/

CISA AA23-032A: #StopRansomware: Kimsuky

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-032a

Microsoft: THALLIUM targets government organizations

https://www.microsoft.com/en-us/security/blog/2019/12/30/microsoft-works-to-protect-customers-from-thallium/

AhnLab: Kimsuky Group's APT Campaign Using Multi-Stage Binary Infection

https://asec.ahnlab.com/en/49525/

New Kimsuky Malware EndClient RAT: First Technical Report and IOCs

https://www.0x0v1.com/endclientrat/

Kimsuky Exploits BlueKeep RDP Vulnerability (CVE-2019-0708) - Larva-24005 Campaign

https://thehackernews.com/2025/04/kimsuky-exploits-bluekeep-rdp.html

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks

https://thehackernews.com/2026/04/dprk-linked-hackers-use-github-as-c2-in.html

Exposed Kim Dump Exposes Kimsuky Hackers New Tactics and Infrastructure

https://teamwin.in/exposed-kim-dump-exposes-kimsuky-hackers-new-tactics-techniques-and-infrastructure/

Inside DPRK Operations: New Lazarus and Kimsuky Infrastructure Uncovered

https://hunt.io/blog

The Coordinated Embassy Hunt: DPRK-linked GitHub C2 Espionage Campaign

https://www.trellix.com/blogs/research/dprk-linked-github-c2-espionage-campaign/

Kimsuky APT continues to target South Korean government using AppleSeed backdoor

https://www.malwarebytes.com/blog/news/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor

DPRK Cyber Group Kimsuky Deploying New Reconnaissance Tools

https://www.sentinelone.com/labs/dprk-cyber-group-kimsuky-deploying-new-reconnaissance-tools/

North Korean APT Kimsuky Targets South Korean Government with Chrome Extension

https://www.ahnlab.com/global/en/site/securityinfo/secunews/secuNewsView.do?seq=32446

CISA Alert: AppleSeed Malware Used by Kimsuky

https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-208a

Google TAG: North Korean Actors Target Security Researchers

https://blog.google/threat-analysis-group/north-korean-actors-target-security-researchers/

AhnLab: Analysis of Kimsuky Group's APT Attacks Disguised as Korean Language Questionnaires

https://asec.ahnlab.com/en/32828/

Microsoft: Springtail North Korean Threat Actor Targets Government Organizations

https://www.microsoft.com/en-us/security/blog/2021/11/18/iranian-targeting-of-it-sector-signals-continued-trend/

Kimsuky APT continues to target South Korean government using AppleSeed backdoor

https://www.malwarebytes.com/blog/threat-intelligence/2024/01/kimsuky-apt-continues-to-target-south-korean-government

ANSSI: Kimsuky Group Tracking

https://www.cert.ssi.gouv.fr/cti/CERTFR-2021-CTI-009/

AhnLab: Kimsuky Group's Continued Activity Targeting Korea

https://asec.ahnlab.com/en/category/threat-actor/kimsuky/

Kimsuky APT continues to target South Korean government using AppleSeed backdoor

https://www.malwarebytes.com/blog/threat-intelligence/2021/06/kimsuky-apt-continues-to-target-south-korea-using-appleseed-backdoor

Kimsuky Group: Tracking the King of Spear Phishing

https://www.sentinelone.com/labs/kimsuky-group-tracking-the-king-of-spear-phishing/

North Korea's Kimsuky APT Weaponizes Blogs for C2

https://www.darkreading.com/cyberattacks-data-breaches/north-korea-kimsuky-apt-weaponizes-blogs-c2

Microsoft - THALLIUM: Detecting a nation-state campaign

https://www.microsoft.com/en-us/security/blog/2019/12/12/thallium-detecting-a-nation-state-campaign/

CERT-NZ Advisory - Kimsuky Group: North Korean Cyber Activity

https://www.cert.govt.nz/it-specialists/advisories/kimsuky-group-north-korean-cyber-activity/

AhnLab ASEC - Kimsuky Group's APT Attacks Using Cloud Services

https://asec.ahnlab.com/en/19352/