Cyber Threat Report: 'The Updated APT Playbook: Tales from the Kimsuky threat actor group'

Report Author Rapid7
Publication Date 2024-03-20
Original Reporting Source
Attributed to Nation North Korea
Related Intrusion Sets Kimsuky

This article by researchers at Rapid7 discusses recent activity by North Korean intrusion set 'Kimsuky'. Kimsuky is primarily focused on intelligence gathering and has targeted South Korean government entities, individuals involved in Korean unification, and global experts in fields of interest to the regime. According to the article, Kimsuky has updated its playbook to bypass modern security measures. Their tactics have evolved from using weaponized Office documents and ISO files to abusing shortcut files (LNK files) and, more recently, exploiting CHM files delivered via ISO, VHD, ZIP, or RAR files to execute malicious code. The article provides an in-depth analysis of an attack involving a CHM file used by Kimsuky. It details the structure of the CHM file, the use of Base64 encoded VBScript for execution, and the methods employed for system information gathering and maintaining persistence on the victim's system.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques