BlueKeep Bleak: North Korea’s Kimsuky Strikes Again with RDP Exploit on South Korea and Japan
Kimsuky, a notorious North Korea-linked group, has been exploiting the BlueKeep RDP flaw to infiltrate targets in South Korea and Japan. Like a cyber ninja, they’ve been sneaking into systems, installing spyware, and launching phishing attacks, all while avoiding detection. It’s a digital heist that leaves no stone unturned, or un-hacked.

Hot Take:
It seems like Kimsuky just can’t resist a good old-fashioned ‘throwback attack,’ resurrecting the 2019 BlueKeep vulnerability like it’s a vintage vinyl record. Who knew cyber espionage had a retro phase?
Key Points:
- Kimsuky, a North Korea-linked APT group, exploits the BlueKeep RDP vulnerability for initial access.
- The attack campaign, dubbed Larva-24005, also employs phishing and exploits older Microsoft Office vulnerabilities.
- Once inside, attackers deploy MySpy, RDPWrap, and keyloggers to maintain access and gather data.
- Targeted regions include South Korea, Japan, and other international targets, focusing on sectors like software and energy.
- Indicators of Compromise (IoC) for these attacks have been published by ASEC researchers for defensive measures.
Already a member? Log in here