Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

In the US, urban gondolas face uphill battles

Act 2 of Drive Capital – How Columbus Ventures Success After Split

Don’t ask the blue ski toll ruble, it’s a toll for you

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korea APT43 uses PowerShell and Dropbox in targeted South Korean cyberattacks
Identity

North Korea APT43 uses PowerShell and Dropbox in targeted South Korean cyberattacks

userBy userFebruary 13, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 13, 2025Ravi LakshmananUS

Korea's cyber attack

Nation-state threat actors with ties to North Korea are associated with ongoing campaigns targeting South Korea’s business, government and cryptocurrency sectors.

The attack campaign by Securonix, called Deep#Drive, stems from a hacking group known as Kimsuky. This is also tracked by the names Apt43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet Chollima.

Cybersecurity

“Using customized fishing lures written in Korean and disguised as legal documents, the attackers successfully infiltrated the target environment,” said security researchers Den Yeuzvik and Tim Peck described the activity in a report shared with Hacker News, “described in a report describing it as a sophisticated and multi-stage surgery.”

Decoy documents sent via phishing emails as .hwp, .xlsx, and .pptx files are disguised as work logs, insurance documents, and crypto-related files to defeat recipients and trigger the infection process.

It is worth noting that the attack chain relies heavily on PowerShell scripts at various stages, such as payload delivery, reconnaissance, and execution. It is also characterized by Dropbox for payload distribution and data removal.

Korea's cyber attack

It all starts with a zip archive containing a single Windows shortcut (.lnk) file pose as a legal document. This triggers the execution of PowerShell code upon extraction and launch to retrieve and display Lure documents hosted in a dropbox, but via a scheduled task named “ChromeUpDateTaskMachine” you can use the Windows host Establish persistence in.

One such lure document written in Korean is related to the safety work plan for forklift operations at logistics facilities, and is intended to delve into the safe handling of heavy cargo and ensure workplace safety standards. It outlines the methods.

The PowerShell script is designed to contact the same dropbox location to get another PowerShell script responsible for collecting and removing system information. Additionally, it drops a third PowerShell script that will ultimately be responsible for running the unknown .NET assembly.

“Using OAuth token-based authentication for Dropbox API interactions has resulted in a pre-determined folder with seamless removal of reconnaissance data, such as system information and active processes,” the researchers said.

Cybersecurity

“This cloud-based infrastructure demonstrates an effective yet stealthy way to host and retrieve payloads and bypass traditional IP or domain block lists. Furthermore, the infrastructure appears dynamic and short-lived. Attacks are not only a complicating analysis, but also a tactic that suggests that attackers actively monitor campaigns for operational security.”

Securonix said it was able to leverage OAuth tokens to gain additional insight into the threat actor’s infrastructure, and found evidence that the campaign could be ongoing since September last year.

“Even though the final stage is missing, the analysis highlights sophisticated techniques employed, such as obfuscation, stealth execution, and dynamic file handling. This avoids detection and incidents. It shows the attacker’s intention to complicate the response,” the researchers concluded.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleJPMorgan says Tether may need to sell Bitcoin to comply with proposed US Stablecoin regulations
Next Article Spyware Maker has caught distribution of malicious Android apps over the years
user
  • Website

Related Posts

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

July 5, 2025

The exposed JDWP interface leads to crypto mining, and Hpingbot targets DDO’s SSH

July 5, 2025

TwinH: A New Frontier in the Pursuit of Immortality?

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

In the US, urban gondolas face uphill battles

Act 2 of Drive Capital – How Columbus Ventures Success After Split

Don’t ask the blue ski toll ruble, it’s a toll for you

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.