Kimsuky

Actor Type Nation State
Attributed to Nation North Korea
Directly Linked Intrusion Sets TA427

Kimsuky is a North Korean sponsored APT group that conducts cyber espionage operations against targets related to the Korean peninsula, nuclear policy, and sanctions. The intrusion set uses various techniques such as spearphishing, social engineering, malicious browser extensions, and remote access tools to gain initial access and maintain persistence on victim networks.

Kimsuky also employs malware such as BabyShark, KimJongRAT, and PCRat to collect and exfiltrate data from compromised systems.

Cyber Threat Graph Context

Explore how this Intrusion Set relates to the wider threat graph

Kimsuky Threat Reports

Report

The Updated APT Playbook: Tales from the Kimsuky threat actor group

This article by researchers at Rapid7 discusses recent activity by North Korean intrusion set 'Kimsuky'. Kimsuky is primarily focused on ...

Report

TODDLERSHARK: ScreenConnect Vulnerability Exploited to Deploy BABYSHARK Variant

Blog post from Kroll which describes the exploitation of vulnerabilities in ConnectWise ScreenConnect to deploy TODDLERSHARK malware which the ...

References

MITRE ATT&CK Techniques

MITRE ATT&CK techniques observed in use by this intrusion set.