CyberSecurity news

FlagThis

@gbhackers.com //
North Korean state-backed threat group Kimsuky, also known as APT43, is actively targeting South Korean entities through a sophisticated cyber campaign, dubbed DEEP#DRIVE. This ongoing operation, potentially active since September, involves attacks leveraging PowerShell and Dropbox against South Korean government, business, and cryptocurrency firms. The attackers initiate intrusions with phishing emails containing a ZIP archive with an LNK file, disguised as legitimate documents, to trick recipients into triggering the infection process.

The attack chain relies heavily on PowerShell scripts for various stages, including payload delivery, reconnaissance, and execution, as well as using Dropbox for payload distribution and data exfiltration. Upon execution, the LNK file initiates a PowerShell script that retrieves a lure document hosted on Dropbox. It also retrieves another PowerShell script for system data exfiltration and installs a third script to execute an unknown .NET assembly. This cloud-based infrastructure enables stealthy payload hosting and retrieval, complicating detection efforts.
Original img attribution: https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8wGX_5y66KHHvTZLlCoDFNgUoIAVtHOY7FYIsK-t5FSNfW-UNlTSLVVGh2-s02azcjseN3M37f009ySTd_4i-2OQRnCJNi4oeqY6ovkP4VS2LrSAuj9oydsxiJx8SNUhgQ6J2rK4Vh2pkfCRUfPPRtdWNSD1urFpic6m-YF5cDdxprq-UTOHo4iovKQzL/s1600/Subheading-1.webp
ImgSrc: blogger.googleu

Share: bluesky twitterx--v2 facebook--v1 threads


References :
Classification: