Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

North Korea-linked hackers use GitHub as C2 in multi-stage attack targeting South Korea

Convicted spyware maker Brian Fleming avoids prison with sentence

Spain’s Xoople raises $130 million in Series B to create global maps for AI

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korea-linked hackers use GitHub as C2 in multi-stage attack targeting South Korea
Identity

North Korea-linked hackers use GitHub as C2 in multi-stage attack targeting South Korea

By April 6, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 6, 2026Malware/Threat Intelligence

Threat actors believed to be affiliated with the Democratic People’s Republic of Korea (DPRK) have been observed using GitHub as a command and control (C2) infrastructure in multi-stage attacks targeting organizations in South Korea.

According to Fortinet FortiGuard Labs, the attack chain includes an obfuscated Windows shortcut (LNK) file that serves as the starting point, a decoy PDF document, and a PowerShell script that prepares the next phase of the attack. These LNK files are known to be distributed through phishing emails.

As soon as the payload is downloaded, the victim sees a PDF document while the malicious PowerShell script runs silently in the background. PowerShell scripts perform analysis-resistant checks by scanning running processes related to virtual machines, debuggers, and forensic tools. If any of these processes are detected, the script will terminate immediately.

Otherwise, extract Visual Basic Script (VBScript) and set persistence using a scheduled task that launches a PowerShell payload every 30 minutes in a hidden window to avoid detection. This will automatically run the PowerShell script every time the system is restarted.

The PowerShell script then profiles the compromised host, saves the results to a log file, and extracts it to a GitHub repository created under the account “motoralis” using a hardcoded access token. GitHub accounts created as part of the campaign include ‘God0808RAMA,’ ‘Pigresy80,’ ‘entire73,’ ‘pandora0009,’ and ‘brandonleeodd93-blip.’

The script then parses specific files within the same GitHub repository to retrieve additional modules and instructions. This allows operators, armed with the trust associated with platforms like GitHub, to blend in with and maintain durable control over infected hosts.

Fortinet said previous campaigns have used LNK files to spread malware families such as the Xeno RAT. It is worth noting that the use of GitHub C2 to distribute the Xeno RAT and its variant MoonPeak was documented by ENKI and Trellix last year. These attacks are believed to be the work of a North Korean state-backed group known as Kimsuk.

“Instead of relying on complex custom malware, threat actors are using native Windows tools for deployment, evasion, and persistence,” said security researcher Carla Lin. “By minimizing the use of dropped PE files and leveraging LolBins, attackers can target a wide range of users with low detection rates.”

This disclosure comes as AhnLab details a similar LNK-based infection chain from Kimsuky that ultimately led to the deployment of a Python-based backdoor.

As before, the LNK file runs a PowerShell script and creates a hidden folder in the “C:\windirr” path to stage a payload, such as a decoy PDF or another LNK file that mimics a Hangul Word Processor (HWP) document. It also deploys an intermediate payload to set persistence and launch a PowerShell script, which uses Dropbox as a C2 channel to retrieve the batch script.

The batch file then downloads two separate ZIP file fragments from the remote server (“quickcon[.]store”) and combine them to create a single archive from which we extract the XML task scheduler and Python backdoor. The task scheduler is used to launch the implant.

The Python-based malware supports the ability to download additional payloads and execute commands issued from the C2 server. This step allows you to run shell scripts, list directories, upload/download/delete files, and run BAT, VBScript, and EXE files.

This finding is also consistent with ScarCruft moving away from traditional LNK-based attack chains to HWP OLE-based droppers to deliver RokRAT, a remote access Trojan used exclusively by North Korean hacker groups, according to S2W. Specifically, the malware is embedded as an OLE object within an HWP document and executed via DLL sideloading.

“Unlike previous attack chains that progressed from BAT scripts dropped by LNK to shellcode, in this case we observed that newly developed dropper and downloader malware was used to deliver shellcode and ROKRAT payloads,” the South Korean security firm said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleConvicted spyware maker Brian Fleming avoids prison with sentence

Related Posts

How SOCs solve critical risks in three steps

April 6, 2026

Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More

April 6, 2026

How LiteLLM turned developer machines into attackers’ credential vaults

April 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

North Korea-linked hackers use GitHub as C2 in multi-stage attack targeting South Korea

Convicted spyware maker Brian Fleming avoids prison with sentence

Spain’s Xoople raises $130 million in Series B to create global maps for AI

How SOCs solve critical risks in three steps

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.