Kimsuky Strikes Again: North Korean Phishing Scams Go Global with Russian Twist
Kimsuky, a North Korea-aligned threat actor, is swapping sushi for borscht in its latest phishing scam by using Russian email addresses to trick users. Their ultimate goal? Credential theft. They’ve even co-opted a university email server to send out these sneaky messages. Who knew cybercrime could have a travel itinerary?

Hot Take:
Well, Kimsuky is back at it again, proving that even in the world of cybercrime, they’re the masters of disguise. And who would have guessed? They’ve traded their usual cyber-espionage trench coats for Russian sender addresses. What’s next, a phishing attack from Santa’s workshop? North Korea’s phishing team might just win an Oscar for best impersonation!
Key Points:
- Kimsuky, a North Korea-aligned threat actor, is linked to phishing attacks using Russian sender addresses.
- The attacks utilize VK’s Mail.ru service and other alias domains to conduct credential theft.
- Phishing campaigns masquerade as legitimate financial institutions and cloud services like Naver’s MYBOX.
- Kimsuky uses compromised email servers and legitimate tools like PHPMailer and Star to send emails.
- The ultimate goal is credential theft to hijack accounts and launch further attacks.
Already a member? Log in here