Warning Against Distribution of Malware Disguised as Research Papers (Kimsuky Group)

Warning Against Distribution of Malware Disguised as Research Papers (Kimsuky Group)

Recently, the AhnLab SEcurity intelligence Center (ASEC) confirmed the phishing email attack case where the Kimsuky group disguised their attack as a request for paper review from a professor. The email prompted the recipient to open a HWP document file with a malicious OLE object attachment. The document was password-protected,

Phishing Email Attacks by the Larva-24005 Group Targeting Japan

Phishing Email Attacks by the Larva-24005 Group Targeting Japan

AhnLab SEcurity intelligence Center (ASEC) has identified the behavior of Larva-24005 breaching servers in Korea and then establishing a web server, database, and PHP environment for sending phishing emails.   Larva-24005 is using the attack base to target not only South Korea but also Japan. The main targets are those

2023 Dec. – Threat Trend Report on Kimsuky Group

2023 Dec. – Threat Trend Report on Kimsuky Group

Overview   The Kimsuky group’s activities in December 2023 showed an overall decrease in comparison to November, but phishing (ETC) domains increased by almost threefold with all the others showing a slight decrease.   Attack Statistics   Compared to November, the number of fully qualified domain names (FQDNs) decreased slightly

Similar AhnLab Response Cases Regarding Korea-US Joint Cyber Security Advice

Similar AhnLab Response Cases Regarding Korea-US Joint Cyber Security Advice

On June 2nd, the Korean NIS (National Intelligence Service), NPA (National Police Agency), and MOFA (Ministry of Foreign Affairs) released a joint security advisory regarding the spear phishing attacks of North Korea’s Kimsuky group with the US FBI (Federal Bureau of Investigation), DoS (Department of State), and NSA (National Security

Kimsuky Group Uses ADS to Conceal Malware

Kimsuky Group Uses ADS to Conceal Malware

AhnLab Security Emergency response Center (ASEC) has discovered that the Kimsuky group is using Alternate Data Stream (ADS) to hide their malware. This malware is an Infostealer that collects data by starting the VBScript included inside an HTML file. It can be characterized by its tendency to add the actual

Kimsuky Group Distributes Malware Disguised as Profile Template (GitHub)

Kimsuky Group Distributes Malware Disguised as Profile Template (GitHub)

AhnLab Security Emergency response Center (ASEC) has confirmed the distribution of a malicious Word file disguised as a profile template from emails impersonating a certain professor. ‘[Attachment] Profile Template.doc’ is the filename of the password-protected Word file that was discovered, with the password itself being included in the body of

Overview of AhnLab’s Response to “Korea-Germany Joint Cyber Security Advice”

Overview of AhnLab’s Response to “Korea-Germany Joint Cyber Security Advice”

On March 20, Korea’s National Intelligence Service (NIS) and Germany’s Federal Office for the Protection of the Constitution (Bundesamt für Verfassungsschutz, BfV) released a joint security advisory related to the Kimsuky hacker group. According to the joint security advisory, the Kimsuky hacker group exploited the extension feature of Chromium browsers