Kimsuky Strikes Again: North Korean Hackers Unleash ForceCopy Stealer in Cyber Espionage Blitz!

Researchers at AhnLab Security Intelligence Center have identified North Korea’s Kimsuky APT group using spear-phishing attacks to deploy ForceCopy info-stealer malware. This cyberespionage group targets organizations globally, using custom RDP Wrappers and malicious shortcut files to control infected systems.

Pro Dashboard

Hot Take:

North Korea’s Kimsuky APT Group is back at it again, proving that if cyber-espionage were an Olympic sport, they’d definitely be going for the gold. This time, they’re armed with fake Office documents and enough malware to make even the most secure IT administrator break a sweat. It’s like a cybersecurity horror movie, and North Korea is the director, producer, and star.

Key Points:

  • Kimsuky APT group is using spear-phishing tactics to deliver ForceCopy info-stealer malware.
  • Malicious *.LNK shortcut files, disguised as Office documents, are used to execute malware.
  • Custom RDP Wrapper is employed to enable remote desktop access and avoid detection.
  • ForceCopy malware is used for capturing keystrokes and extracting files from browsers.
  • ASEC researchers observed changes in Kimsuky’s attack methods, focusing on remote control tools.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?