Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Fake WhatsApp API package on npm steals messages, contacts, and login tokens

TikTok Shop launches digital gift cards to compete with Amazon and eBay

Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korea APT43 uses PowerShell and Dropbox in targeted South Korean cyberattacks
Identity

North Korea APT43 uses PowerShell and Dropbox in targeted South Korean cyberattacks

userBy userFebruary 13, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 13, 2025Ravi LakshmananUS

Korea's cyber attack

Nation-state threat actors with ties to North Korea are associated with ongoing campaigns targeting South Korea’s business, government and cryptocurrency sectors.

The attack campaign by Securonix, called Deep#Drive, stems from a hacking group known as Kimsuky. This is also tracked by the names Apt43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet Chollima.

Cybersecurity

“Using customized fishing lures written in Korean and disguised as legal documents, the attackers successfully infiltrated the target environment,” said security researchers Den Yeuzvik and Tim Peck described the activity in a report shared with Hacker News, “described in a report describing it as a sophisticated and multi-stage surgery.”

Decoy documents sent via phishing emails as .hwp, .xlsx, and .pptx files are disguised as work logs, insurance documents, and crypto-related files to defeat recipients and trigger the infection process.

It is worth noting that the attack chain relies heavily on PowerShell scripts at various stages, such as payload delivery, reconnaissance, and execution. It is also characterized by Dropbox for payload distribution and data removal.

Korea's cyber attack

It all starts with a zip archive containing a single Windows shortcut (.lnk) file pose as a legal document. This triggers the execution of PowerShell code upon extraction and launch to retrieve and display Lure documents hosted in a dropbox, but via a scheduled task named “ChromeUpDateTaskMachine” you can use the Windows host Establish persistence in.

One such lure document written in Korean is related to the safety work plan for forklift operations at logistics facilities, and is intended to delve into the safe handling of heavy cargo and ensure workplace safety standards. It outlines the methods.

The PowerShell script is designed to contact the same dropbox location to get another PowerShell script responsible for collecting and removing system information. Additionally, it drops a third PowerShell script that will ultimately be responsible for running the unknown .NET assembly.

“Using OAuth token-based authentication for Dropbox API interactions has resulted in a pre-determined folder with seamless removal of reconnaissance data, such as system information and active processes,” the researchers said.

Cybersecurity

“This cloud-based infrastructure demonstrates an effective yet stealthy way to host and retrieve payloads and bypass traditional IP or domain block lists. Furthermore, the infrastructure appears dynamic and short-lived. Attacks are not only a complicating analysis, but also a tactic that suggests that attackers actively monitor campaigns for operational security.”

Securonix said it was able to leverage OAuth tokens to gain additional insight into the threat actor’s infrastructure, and found evidence that the campaign could be ongoing since September last year.

“Even though the final stage is missing, the analysis highlights sophisticated techniques employed, such as obfuscation, stealth execution, and dynamic file handling. This avoids detection and incidents. It shows the attacker’s intention to complicate the response,” the researchers concluded.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleJPMorgan says Tether may need to sell Bitcoin to comply with proposed US Stablecoin regulations
Next Article Spyware Maker has caught distribution of malicious Android apps over the years
user
  • Website

Related Posts

Fake WhatsApp API package on npm steals messages, contacts, and login tokens

December 22, 2025

Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

December 22, 2025

How to browse the web more sustainably with a green browser

December 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Fake WhatsApp API package on npm steals messages, contacts, and login tokens

TikTok Shop launches digital gift cards to compete with Amazon and eBay

Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

How to browse the web more sustainably with a green browser

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.