North Korean-backed APT group Kimsuky evolves reconnaissance capabilities in recent global campaign

North Korean-backed APT group Kimsuky evolves reconnaissance capabilities in recent global campaign

Researchers from SentinelLabs have observed ongoing attacks from Kimsuky, a North Korean state-sponsored APT (advanced persistent threat) that has a long history of targeting organizations across Asia, North America, and Europe. Kimsuky has a long history of targeted attacks across the world. Current understanding of the group indicates they are primarily assigned to intelligence collection and espionage operations in support of the North Korean government since at least 2012.

“Ongoing campaigns use a new malware component we call ReconShark, which is actively delivered to specifically targeted individuals through spear-phishing emails, OneDrive links leading to document downloads, and the execution of malicious macros,” Tom Hegel and Aleksandar Milenkoski, SentinelLabs’ researchers wrote in a recent blog post. “ReconShark functions as a reconnaissance tool with unique execution instructions and server communication methods. Recent activity has been linked to a wider set of activity we confidently attribute to North Korea.”

SentinelLabs said that historically, Kimsuky targets have been located across countries in North America, Asia, and Europe. “In the groups latest campaigns, they continue their global targeting themed around various ongoing geopolitical topics. For example, the latest Kimsuky campaigns have focused on nuclear agendas between China and North Korea, relevant to the ongoing war between Russia and Ukraine,” the researchers identified.

In a recent campaign Kimsuky targeted the staff of Korea Risk Group (KRG), the information and analysis firm specializing in matters directly and indirectly impacting the Democratic People’s Republic of Korea (DPRK), the post said. “We applaud KRG’s willingness to publicly share our analysis of attacks against them so the wider cybersecurity community can use this intelligence for expanded understanding of the Kimsuky threat actor and their own hunting and detection efforts. Our assessment is that the same campaign has been used to continue targeting other organizations and individuals in at least the United States, Europe, and Asia, including think tanks, research universities, and government entities.”

For the deployment of ReconShark, Kimsuky continues to make use of specially crafted phishing emails, the researchers said. “Notably, the spear-phishing emails are made with a level of design quality tuned for specific individuals, increasing the likelihood of opening by the target. This includes proper formatting, grammar, and visual clues, appearing legitimate to unsuspecting users. Notably, the targeted emails, which contain links to download malicious documents, and the malicious documents themselves, abuse the names of real individuals whose expertise is relevant to the lure subject such as Political Scientists.”

In the malicious emails, Kimsuky entices the target to open a link to download a password-protected document. Most recently, they made use of Microsoft OneDrive to host the malicious document for download, the SentinelLabs post said. 

“The lure documents Kimsuky distributes contain Microsoft Office macros that activate on document close,” according to Hegel and Milenkoski. “Based on overlaps in file naming conventions, used malware staging techniques, and code format, we assess that the macros implement a newer variant of a reconnaissance capability of the Kimsuky’s BabyShark malware seen targeting entities in the Korean peninsula towards the end of 2022. We refer to this BabyShark component as ReconShark.”

The researchers also said that the ability of ReconShark to exfiltrate valuable information, such as deployed detection mechanisms and hardware information, indicates that ReconShark is part of a Kimsuky-orchestrated reconnaissance operation that enables subsequent precision attacks, possibly involving malware specifically tailored to evade defenses and exploit platform weaknesses.

The main responsibility of ReconShark is to exfiltrate information about the infected platform, such as running processes, information about the battery connected to the system, and deployed endpoint threat detection mechanisms, the post added.

“In addition to exfiltrating information, ReconShark deploys further payloads in a multi-stage manner that are implemented as scripts (VBS, HTA, and Windows Batch), macro-enabled Microsoft Office templates, or Windows DLL files,” Hegel and Milenkoski added. “ReconShark decides what payloads to deploy depending on what detection mechanism processes run on infected machines.”

They added that all observed infrastructure in this campaign is hosted on a shared hosting server from NameCheap, “whom we’ve already notified of this malicious activity and recommended takedowns. Kimsuky operators continually made use of LiteSpeed Web Server (LSWS) for managing the malicious functionality,” according to the post.

The researchers said in conclusion that the ongoing attacks from Kimsuky and their use of the new reconnaissance tool, ReconShark, highlight the evolving nature of the North Korean threat landscape. “Organizations and individuals need to be aware of the TTPs used by North Korean state-sponsored APTs and take necessary precautions to protect themselves against such attacks. The link between recent activity and a wider set of previously unknown activity attributed to North Korea underscores the need for continued vigilance and collaboration,” they added.

In March, Mandiant had assessed with ‘high confidence’ that APT43 is a moderately-sophisticated cyber operator that supports the interests of the North Korean regime. Campaigns attributed to APT43 include strategic intelligence collection aligned with Pyongyang’s geopolitical interests, credential harvesting, and social engineering to support espionage activities, and financially-motivated cyber crime to fund operations. Publicly reported activities attributed to APT43 are frequently reported as ‘Kimsuky’ or ‘Thallium’ and include credential harvesting and espionage activity most likely intended to inform North Korean leadership on ongoing geopolitical developments.

A complimentary guide to the who`s who in industrial cybersecurity tech & solutions

Free Download

Related