North Korea-linked menace teams are more and more utilizing living-off-the-land (LotL) methods and trusted companies to evade detection, with a current Kimsuky marketing campaign showcasing using PowerShell scripts and storing information in Dropbox folders, together with improved operational safety.
Within the marketing campaign, dubbed “DEEP#DRIVE” by safety agency Securonix, the menace group used pretend work logs, insurance coverage paperwork, and crypto-related information to persuade customers to obtain and run a zipped shortcut file that gathers system configuration info after which executes PowerShell and .NET scripts. The assault instruments add the system information to Dropbox folders after which obtain extra instructions and capabilities for additional compromise.
Whereas the attackers confirmed some curiosity in fast monetary wins — similar to focusing on cryptocurrency customers — for probably the most half, the menace group targeted on stealing delicate information from South Korean authorities companies and companies, says Tim Peck, a senior menace researcher at Securonix.
“We noticed proof of each espionage and monetary motivation, although leaning extra towards espionage,” he says. “This aligns with Kimsuky’s historic focusing on of South Korean authorities companies, enterprises, and strategic industries.”
North Korean cyber-operations teams have persistently focused South Korea and the US, with South Korean authorities companies and corporations among the many hottest targets. In September 2024, the FBI warned that North Korean teams deliberate to launch a surge of assaults towards organizations with important cryptocurrency reserves, and Kimsuky launched a comparable multistage assault towards South Korean targets final 12 months.
A Prolific Group
Kimsuky is not monolithic, however has 5 menace teams which have overlap with what different corporations think about to be the identical group, says menace intelligence agency Recorded Future. One group tends to deal with the healthcare and hospitality sectors, for instance, whereas one other focuses on cryptocurrency markets.

By mid-2023, Kimsuky grew to become probably the most prolific North Korean group. (Newer information not accessible.) Supply: Recorded Future’s “North Korea’s Cyber Technique” report
The Kimsuky teams accounted for probably the most assaults recognized as North Korean in origin between 2021 and 2023, in line with Recorded Future’s “North Korea Cyber Technique” report. In 2024, the teams continued to account for a excessive quantity of assaults, says Mitch Haszard, senior menace intelligence analyst with Recorded Future.
“These teams conduct excessive quantity phishing campaigns, primarily focusing on people and organizations in South Korea, whereas sometimes focusing on entities in different nations,” he says. “Within the exercise we see, these teams seem like going for quantity, moderately than extra time-consuming, tailor-made spear-phishing operations.”
Different well-known North Korean teams, similar to Lazarus and Andariel, aren’t as prolific because the Kimsuky menace actors. Whereas a few of these teams are extra targeted on gathering delicate info, almost all even have a monetary motivation.
Hundreds of Victims?
In the DEEP#DRIVE marketing campaign, following the compromise of a system, the Kimsuky group’s assault scripts add information on the system configuration to certainly one of a number of Dropbox folders. Whereas the Securonix researchers weren’t capable of collect intelligence from all of the suspected Dropbox areas, they uncovered indicators of greater than 8,000 configuration information, though some seem like duplicates, Peck says.
Whereas which means they doubtless got here from the identical sufferer organizations, the marketing campaign seems to be fairly profitable, he says.
“There have been two elements which contributed to the ‘uniqueness’ of the configuration file, the username, and IP tackle,” Peck says. “Some usernames had been related to dozens of comparable IP addresses, which might point out lateral motion by the attacker — [that is], infecting dozens of machines from the identical entity.”
The information from a compromised system consists of the host IP tackle, the system uptime, particulars concerning the OS sort and model, any put in safety software program, and a listing of working processes.
Kimsuky Improves Its OpSec
The marketing campaign additionally highlighted North Korean cyber-operations teams’ enhancements to operational safety. The group used OAuth-based authentication on its Dropbox folders, stopping conventional URL-blocking or network-based defenses from following the hyperlinks. The menace actors additionally shortly took down elements of their infrastructure quickly after the Securonix researchers started investigating, Securonix’s Peck says.
“This stage of operational consciousness will not be all the time current in phishing-driven malware campaigns,” he says.
For corporations, the menace group’s techniques underscore that the hidden file extensions must be disabled, shortcut information must be blocked from executing in consumer folders, and solely signed PowerShell scripts be allowed to execute. These three countermeasures make the attackers’ exercise a lot simpler to detect, Peck says.
As well as, corporations in focused industries — similar to cryptocurrency exchanges and authorities companies — ought to bolster their e mail safety and usually prepare staff on methods to spot phishing threats, says Recorded Future’s Haszard.
“Most North Korean cyberattacks nonetheless begin with social engineering and a phish,” he says. “Firms ought to be certain that they’ve an e mail safety resolution in place and usually prepare staff on phishing threats, in addition to conduct simulated phishing exams.”