Analysis Report on the Latest Attack Cases by Kimsuky Group Exploiting PebbleDash and RDP Wrapper
Analysis Overview
AhnLab SEcurity intelligence Center (ASEC) recently identified that the Kimsuky group is using the backdoor PebbleDash and RDP Wrapper in multiple attacks. The threat actor uses LNK during initial access to install PowerShell malware on the infected system. Once this process is complete, they install custom-made remote control malware and use various tools equipped with information-collecting capabilities to control the infected system and steal information. Among the various attack activities of the Kimsuky group, cases of this type of attack have been continuously increasing since around 2024.
The targets of the attack appear to be diverse, similar to the usual range of Kimsuky group’s activities, and include individuals, organizations, and companies. Given the Kimsuky group’s characteristic focus on collecting sensitive information, their targets also include the public, legal, and academic sectors. Additionally, they also target regular companies under the guise of work and recruitment-related documents. It is also noticeable that numerous malware related to cryptocurrency have been identified recently.
The threat actor uses spear phishing attacks to trick users into executing LNK malware disguised as document files, which then installs a PowerShell script to execute additional payloads. The PowerShell malware is continuously executed by VBS malware registered in the Task Scheduler, downloading and executing additional payloads specified by the threat actor.
The Kimsuky group installs additional malware on infected systems, and as of recent reports, RDP Wrapper has been identified in most attack cases. The threat actor activates RDP, registers a backdoor account, and then uses RDP Wrapper to remotely control the infected system. In this process, a custom-made proxy malware is also used. In past spear phishing attacks using LNK, malware like Amadey or RftRAT was used in the final stage. However, recent attack cases are characterized by the use of RDP for remote screen control rather than controlling the infected system with a custom-made backdoor.[1]
However, backdoors have not been completely abandoned; although not as frequently as RDP Wrapper, cases with PebbleDash have been identified since the first half of 2024. PebbleDash was previously used by the group known as Lazarus, and there are instances where it was used in spear phishing attacks alongside AppleSeed. [2] In the past, most attack cases involved the use of AppleSeed, AlphaSeed, and HappyDoor, with PebbleDash being identified in only a few instances. However, since 2024, a large number of cases with PebbleDash have been identified, and threat actors have used it to remotely control infected systems.
[1] Kimsuky Group Uses AutoIt to Create Malware (RftRAT, Amadey)
[2] Analysis Report on Kimsuky Group’s APT Attacks (AppleSeed, PebbleDash)