Advanced Persistent Threat Kimsuky
About
The U.S. Cybersecurity and Infrastructure Security Agency speculated that Kimsuky is active since 2012. Allegedly, this hacker group stole data from South Korea Hydro & Nuclear Power in March 2015, targeted retired South Korean diplomats, government as well as military officials in August 2019 (calling the attack "the first of its kind"), hacked 11 officials of the United Nations Security Council in September 2020, and intruded the internal networks of the Korea Atomic Energy Research Institute in May 2021.
Key Factors
- Kimsuky uses common commo social engineering tactics, spearphishing, and watering hole attacks to gain desired information from their victims.
- Its main focus is collecting intelligence information on foreign policy and national security issues across Korean peninsula, nuclear policy, and sanctions.
- Generally, it conducts its intelligence collection activities against individuals and organizations of South Korea, Japan, and the U.S.
How Does it Works?
After gaining initial access, Kimsuky uses BabyShark malware and PowerShell or the Windows Command Shell for Execution. It runs executables from the internet without touching the physical hard disk on a computer with the help of the target's memory.
Now, it establish persistence via malicious browser extensions, modifying system processes, manipulating the autostart execution, using Remote Desktop Protocol, and changing the default file association for an application. These methods allow Kimsuky to gain login and password information and/or launch malware outside of some application solutions.
Comments
Post a Comment