Rapport Threat INT V01-1
Rapport Threat INT V01-1
Prepared By :
SAssi Khouloud
Kessentini Feres
Kimsuky
TABLE DES MATIÈRES
General Introduction 1
TEKUP Page i
TABLE DES MATIÈRES
GENERAL CONCLUSION 24
BIBLIOGRAPHIE 24
TEKUP Page ii
LISTE DES FIGURES
1.1 Kimsuky . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2 Activity timeline for Kimsuky . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3 Represents North Korean cyber threat actors (created with Bing Image Creation
powered by Dall-E). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Kimsuky’s aliases (Source : SOCRadar) . . . . . . . . . . . . . . . . . . . . . 7
1.5 Smoke Screen attack employed a legitimate spearphishing email with a malicious
HWP file (Source : ESTsecurity) . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.6 Kimsuky’s Malicious Google Chrome Extension Sharpext’s process flow (Source :
Volexity) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.7 Vulnerability intelligence screenshot of CVE-2017-0199 . . . . . . . . . . . . 10
1.8 Observed Malware and Software associated with Kimsuky . . . . . . . . . . . 11
1.9 Observed CVEs used by Kimsuky . . . . . . . . . . . . . . . . . . . . . . . . 12
1.10 Countries affected by Kimsuky . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.11 Campaign Page of Recon Shark, the tool used by Kimsuky . . . . . . . . . . . 15
1.12 Example of an email that is impersonating a think tank researcher . . . . . . . 16
1.13 SOCRadar XTI Threat Actor page of Kimsuky . . . . . . . . . . . . . . . . . 18
1.14 Company Vulnerabilities page under the Attack Surface Management Module . 21
1.15 IOC (AppleSeed)) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.16 MITRE ATTACK TTPs Used by Kimsuky . . . . . . . . . . . . . . . . . . . . 23
Kimsuky attracted attention for its claimed involvement in cyber-espionage activities, with a
primary focus on South Korea and other nearby nations. The organization has related to different
initiatives intended at collecting sensitive information, performing reconnaissance, and carrying
out cyber assaults since at least 2013. Kimsuky often uses spear-phishing emails, malware
distribution, and social engineering to infiltrate its targets. The organization has been connected
to assaults against government bodies, military groups, and defense contractors, with the goal
of acquiring intelligence and perhaps assisting North Korea’s strategic goals.
To have a more accurate and current understanding of groups like Kimsuky and their operations,
it’s critical to remain up to speed with the newest information and cybersecurity reports. Keep
in mind that the cyber threat landscape may evolve quickly, and new discoveries may have
occurred after my last update.
TEKUP Page 1
Chapitre
1
Threat Actor Analysis : kimsuky
Sommaire
1.1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.1 Threat Actor Analysis . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.2 Importance of Studying Threat Actors . . . . . . . . . . . . . . 3
1.1.3 Overview of Kimsuky . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Introduction of the Threat Actor . . . . . . . . . . . . . . . . . 5
1.2.1 Timeline of Their Activity . . . . . . . . . . . . . . . . . . . . . 6
1.2.2 Threat Actor Profile . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3 CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.4 How to Defend Against Kimsuky . . . . . . . . . . . . . . . . . 20
1.5 Security Recommendations Against Kimsuky . . . . . . . . . 20
1.6 Indicators of compromise (IOC) . . . . . . . . . . . . . . . . . . 21
1.7 MITRE ATTACK TTPs Used by Kimsuky . . . . . . . . . . . 22
TEKUP Page 2
THREAT ACTOR ANALYSIS : KIMSUKY
1.1 INTRODUCTION
1.1.1.1 Introduction :
Organizations are increasingly challenged with complex threats sponsored by hostile actors
as cybersecurity environments evolve. Threat actor analysis is a critical subject within cybersecurity,
encompassing the in-depth assessment of threat actors’ strategies, methods, and procedures
(TTPs) used to breach systems, steal data, and disrupt operations.
1.1.1.2 Purpose :
Understanding threat actors is similar to solving the puzzle of cyber threats. It entails investigating
the motives, tactics, and tools used by malevolent actors in order to strengthen defenses, proactively
detect possible threats, and effectively respond to cyber events.
1.1.1.3 Scope :
Threat actor analysis covers a wide range of operations, including the investigation of
state-sponsored groups, criminal organizations, hacktivists, and other entities involved in cybercrime.
Defenders get vital insights into the dynamic nature of cyber threats by deconstructing their
activities.
The cybersecurity world is changing, and attackers are growing more complex. Organizations
that want to establish strategic defensive measures must first study threat actors. Defenders can
successfully anticipate and prevent possible threats by studying their attackers.
TEKUP Page 3
THREAT ACTOR ANALYSIS : KIMSUKY
In the case of a cyber crisis, having a thorough awareness of threat actors helps firms
to respond quickly and efficiently. Incident responders equipped with information about the
precise strategies employed by threat actors may quickly contain, remove, and recover from a
security breach.
Threat actor analysis offers enterprises with actionable intelligence to help them mitigate
risks more effectively. Organizations may deploy targeted security measures to protect their
digital assets by analyzing patterns and trends in the techniques used by threat actors.
1.1.3.1 Background :
Kimsuky is a well-known North Korean threat actor with a track record of state-sponsored
cyber espionage. This research digs into their activity schedule, their distinct threat actor profile,
and the tactics they use to achieve their goals.
1.1.3.2 Evolution :
Kimsuky’s growth as a threat actor emphasizes the importance of ongoing study. Organizations
may predict future approaches and strengthen their resistance against emerging threats by tracking
their actions over time.
TEKUP Page 4
THREAT ACTOR ANALYSIS : KIMSUKY
Kimsuky’s strategic importance stems from its potential influence on geopolitical, economic,
and technical environments. The goals, targets, and tactics of the threat actor provide difficulties
that necessitate a watchful and adaptable cybersecurity posture.
We intend to present a detailed study of Kimsuky in this research, delivering insights that
will enable enterprises to harden their defenses and respond effectively to the changing threat
landscape.
Kimsuky (also known as Velvet Chollima, Black Banshee, and Thallium) is a well-known
state-sponsored threat actor from North Korea. Since 2012, the gang has been targeting companies
and people with new phishing themes. It has a history of initiating attacks against countries
such as Japan, the United States, Russia, and European countries. Kimsuky agents specialize
in collecting intelligence secrets from the United States and its closest Asian allies, including
Japan and South Korea. Kimsuky’s principal focus in recent campaigns has been pharmaceutical
companies.
TEKUP Page 5
THREAT ACTOR ANALYSIS : KIMSUKY
— 2013 : First observed targeting South Korean government entities and defectors
— 2015 : Expanded targets to include think tanks and defense contractors
— 2017 : Deployed "Operation Moonrise" campaign targeting South Korean nuclear
operators
— 2018 : Used stolen South Korean military documents to impersonate officials in
spear-phishing attacks
— 2020 : Employed malicious Chrome extensions and exploited Microsoft vulnerabilities
— 2021 : Leverages new malware strains like KGH_SPY and CSPY Downloader
— 2022 : Targets research institutes in South Korea with backdoor attacks
For a long time, the Korean Peninsula has been a hub of activity in cyberspace. With the
confrontation between North and South Korea escalating, North Korean Advanced Persistent
Threats (APTs) are emerging as the preferred weapon. One name jumps out among these :
Kimsuky.
TEKUP Page 6
THREAT ACTOR ANALYSIS : KIMSUKY
North Korean APTs have been behind some of the most daring cyber-attacks in recent
memory. According to a United Nations assessment, North Korean hackers stole more than $2
billion from banks and cryptocurrency exchanges. These cash are thought to be used to support
North Korea’s nuclear programs.
F IGURE 1.3 – Represents North Korean cyber threat actors (created with Bing Image Creation
powered by Dall-E).
Kimsuky (or APT43), a moniker that sends shockwaves across the cybersecurity industry,
is a cyber-espionage outfit based in North Korea. Kimsuky, first spotted in 2013, has been
determined to pursue sensitive material, especially in South Korea but also in the United States
and Europe.
TEKUP Page 7
THREAT ACTOR ANALYSIS : KIMSUKY
Kimsuky uses a variety of techniques to enter systems and obtain sensitive information.
Let’s break down their strategy :
Emails posing as spam
Spearphishing emails are one of the key tactics Kimsuky use to obtain unauthorized access
TEKUP Page 8
THREAT ACTOR ANALYSIS : KIMSUKY
to networks. These are emails that are sent to specific people or groups. Malicious files or
URLs are frequently included in the emails. Kimsuky, for example, is known to employ Hangul
Word Processor (HWP) files, which are popular in South Korea. These files include known
vulnerability exploits or a dropper masquerading as a paper.
Malicious Chrome Extensions
F IGURE 1.5 – Smoke Screen attack employed a legitimate spearphishing email with a malicious
HWP file (Source : ESTsecurity)
Kimsuky has also been spotted infecting users with malicious Google Chrome extensions. They
trick users into visiting websites that look trustworthy and then ask them to install a Chrome
extension. Once installed, this extension can collect browser cookies and passwords.
Exploiting Vulnerabilities
F IGURE 1.6 – Kimsuky’s Malicious Google Chrome Extension Sharpext’s process flow (Source :
Volexity)
TEKUP Page 9
THREAT ACTOR ANALYSIS : KIMSUKY
Kimsuky is well-known for exploiting known software vulnerabilities. They have, for example,
used a vulnerability in Microsoft Word (CVE-2017-0199) to run malicious malware. Kimsuky
may obtain access to computers with minimum notice by keeping a watch on newly identified
vulnerabilities and exploiting them before they are fixed.
Use of Malware
Kimsuky uses malware to keep control of a machine once they have gotten access to it. BabyShark
is one such spyware that collects data from affected systems. Keyloggers and remote control
software are also used to monitor the user’s activity and obtain more information.
Kimsuky’s assaults are meticulously planned and executed. They are a strong danger due to their
ability to utilize a mix of spearphishing, exploiting vulnerabilities, and distributing malware.
Kimsuky conducts cyber espionage campaigns using a range of technologies and exploiting
different vulnerabilities. Take a closer look :
1-Tools :
Kimsuky’s toolbox is wide and diverse, demonstrating his expertise and versatility. They are a
serious and persistent danger due to their ability to exploit a variety of vulnerabilities and use a
wide collection of tools.
TEKUP Page 10
THREAT ACTOR ANALYSIS : KIMSUKY
— BabyShark Malware :
The BabyShark virus is a significant tool in Kimsuky’s arsenal. This spyware is
designed to collect information from affected computers. As a second-stage payload,
it is frequently transmitted via spearphishing emails.
— Gold Dragon :
*Gold Dragon, a data-gathering tool discovered in December 2017 after a spearphishing
attack in Korea aimed at the same Olympic-related companies. It was discovered
that the technology was utilized in activities intended targeting entities associated
with the 2018 Pyeongchang Winter Olympics.
Gold Dragon, as a second-stage backdoor implant, assured a persistent presence on
the victim’s machine following the execution of a fileless, PowerShell-based first
assault that leveraged steganography.
This virus was capable of basic reconnaissance, data extraction, and downloading
further components from its command and control site.
— SWEETDROP :
SWEETDROP is a malware dropper that Kimsuky is actively using during the
Covid-19 epidemic. It is a C/C++ Windows application that collects basic system
information and is capable of downloading and running extra stages such as Kimsuky’s
backdoor "BITTERSWEET" download and execution.
TEKUP Page 11
THREAT ACTOR ANALYSIS : KIMSUKY
— CVE-2017-0199
Kimsuky used this flaw to distribute the BabyShark virus. This is a Microsoft Word
vulnerability that allows a specially designed file to run code.
— HWP Exploits
In South Korea, Hangul Word Processor (HWP) files are frequently utilized. Kimsuky
has been known to deploy droppers on computers using HWP files containing exploits
for known vulnerabilities.
— CVE-2015-2545
This is a Microsoft Office vulnerability that permits remote code execution via
carefully constructed EPS image files. Kimsuky took use of this flaw to execute
malicious code and install malware on victim systems.
— CVE-2019-0604
Kimsuky used this Microsoft SharePoint vulnerability to execute arbitrary code.
Attackers can launch arbitrary code in the context of the SharePoint application
pool and the SharePoint server farm account by submitting a specially designed
SharePoint application package.
Kimsuky primarily espionages South Korean intellectual tanks, industry, nuclear power
operators, and the Ministry of Unification.
TEKUP Page 12
THREAT ACTOR ANALYSIS : KIMSUKY
Targeted Sectors
Kimsuky’s cyber-espionage efforts are extremely focused. They concentrate on select industries
and nations that match with North Korea’s strategic aims. Kimsuky’s most targeted industries
are :
— Government Institutions,
— Think Tanks and Academic Institutions,
— Media Outlets (Publishing Services),
— Critical Infrastructure (Energy & Utilities, Space & Defence, National Security&International
Affairs),
— Cryptocurrency & NFT (Banking, Finance),
— Information Services
Targeted Countries
Kimsuky’s actions are said to be aligned with the Reconnaissance General Bureau (RGB), North
Korea’s foreign intelligence agency, and the group’s major targets are mostly :
— South Korea
— United States
— European Countries
Kimsuky has been involved in a number of different activities, each with its own set of goals
and objectives. Kimsuky is credited with the following noteworthy operations :
TEKUP Page 13
THREAT ACTOR ANALYSIS : KIMSUKY
this operation. The attack showcased Kimsuky’s capabilities and raised worries about critical
infrastructure security.
Late 2018
Kimsuky ran a spearphishing campaign against many foreign ministries and think groups. The
spearphishing emails contained malicious Microsoft Word documents that downloaded and
executed the BabyShark malware by exploiting a known vulnerability (CVE-2017-0199). The
United Nations Security Council, the United States Department of State, and various think
groups in the United States and Europe were among the targets.
TEKUP Page 14
THREAT ACTOR ANALYSIS : KIMSUKY
F IGURE 1.11 – Campaign Page of Recon Shark, the tool used by Kimsuky
2021
Kimsuky was seen delivering a backdoor known as AppleSeed during this operation. The gang
targeted South Korean government agencies using spearphishing emails. When the emails were
opened, the malicious attachments installed the AppleSeed backdoor on the victim’s PC. This
backdoor enabled Kimsuky to remotely exfiltrate data and execute commands.
2023
Kimsuky has now been linked to a new effort titled Operation CloudDragon. This campaign
employs social engineering, spearphishing, and bespoke malware to target think tanks, news
outlets, and North Korean specialists. Kimsuky utilized forged URLs, impersonated journalists,
and weaponized Office documents to steal credentials and acquire strategic intelligence.
TEKUP Page 15
THREAT ACTOR ANALYSIS : KIMSUKY
April 2023
AttackIQ has developed four new attack graphs that simulate Kimsuky’s espionage operations.
This politically motivated North Korean foe has been involved in sophisticated espionage activities,
and the attack graphs reveal insights into their strategies and procedures.
June 2023
Kimsuky has been active in social engineering efforts targeting think tanks, academia, and the
news media, according to a joint Cybersecurity Advisory issued by US and Republic of Korea
(ROK) authorities. The alert goes into depth on how Kimsuky actors operate and the warning
indicators of spearphishing attacks. North Korea places a high value on intelligence obtained
from these missions. Kimsuky has been active in impersonation efforts and has targeted governments,
political groups, and other organizations for intelligence gathering.
TEKUP Page 16
THREAT ACTOR ANALYSIS : KIMSUKY
Kimsuky is one of numerous APT organizations thought to be based in North Korea. While
Kimsuky acts autonomously, there are evidence that it is linked to other North Korean APT
organizations.
Lazarus
The Lazarus Group, for example, is well-known for its global cyber espionage and criminal
efforts. The Lazarus Group has been linked to high-profile assaults such as the 2014 Sony
Pictures breach and the 2017 WannaCry ransomware campaign.
While there is no clear proof tying Kimsuky to the Lazarus Group, their techniques and
targets are identical. Furthermore, both organizations are thought to be backed by the North
Korean government, implying that they may exchange resources or knowledge.
APT37 (Reaper)
APT37 or Reaper, another North Korean APT organization, has been active since at least 2012.
APT37, like Kimsuky, has mostly targeted South Korea but has also carried out attacks in Japan,
Vietnam, and the Middle East. In its cyber-espionage efforts, APT37 is notorious for using
zero-day vulnerabilities and malware.
While there is no solid proof of direct coordination between Kimsuky and APT37, the
similarities in their targets and techniques imply that they may be part of a coordinated North
Korean government cyber espionage effort.
TEKUP Page 17
THREAT ACTOR ANALYSIS : KIMSUKY
— “kimm.r-naver[.]com”,
— “kimsukyang and Kim asdfa” the owner of “iop110112hotmail[.]com and rsh1213hotmail[.]com
domains extracted in one of the first observations.
— And other IoCs contain “tjkim”, “kimyfrenotsure”, “kimshan”, “Kim_Summit”, etc.
These and other IoCs may be found on SOCRadar XTI’s Cyber Threat Intelligence Module’s
Kimsuky Threat Actor page
As a result of these IoCs, it is also plausible to establish that Kimsuky is a distinct threat
actor distinct from other North Korean threat actors.
International authorities have lately taken major action against the Kimsuky APT organization.
The US Treasury Department, in collaboration with foreign partners, sanctioned eight North
Korean operatives and the Kimsuky organization. This action is in reaction to North Korea’s
alleged military satellite launch, with the goal of impeding its capacity to earn income and
progress its weapons of mass destruction (WMD) programs. The restrictions are part of a
broader campaign to confront Pyongyang’s unlawful actions, which include cyber espionage
TEKUP Page 18
THREAT ACTOR ANALYSIS : KIMSUKY
and endanger world security. More details regarding the issue may be found in the US Department
of Treasury’s news statement.
Separately, the AhnLab Security Emergency Response Center (ASEC) stated that Kimsuky
is using a malicious JSE file disguised as an import statement to target South Korean research
organizations. This file contains a PowerShell script that has been obfuscated, a Base64-encoded
backdoor file, and a fake PDF. The virus persists on the infected system and steals sensitive data
such as the system’s anti-malware status, network information, and user data. It encrypts the
command execution results and delivers them to the malware’s command and control server,
making it harder to detect. The findings of AhnLab underline the need of exercising caution
when opening email attachments from unfamiliar sources, since Kimsuky frequently employs
them for targeted assaults.
1.3 CONCLUSION
Since its discovery in 2013, Kimsuky, a North Korean cyber-espionage cell, has been a
persistent and expanding danger. Kimsuky has targeted government institutions, think tanks,
academic institutions, and key infrastructure in South Korea, as well as the United States and
Europe, with an emphasis on intelligence collection.
Kimsuky’s methods are clever and diverse, ranging from spearphishing emails and exploiting
software weaknesses to the use of malicious Chrome extensions and proprietary malware.
Because of the group’s capacity to adapt and change its methods, it is very deadly.
Furthermore, Kimsuky is not acting alone. It is part of a wider North Korean APT network
that includes the Lazarus Group and APT37. While these groups operate independently, they
share methods and targets, implying a concerted effort by the North Korean government.
Kimsuky’s worldwide reach and dynamic nature underscore the significance of vigilance
and comprehensive cybersecurity measures. As Kimsuky adapts and evolves, so must the defenses
against him.
TEKUP Page 19
THREAT ACTOR ANALYSIS : KIMSUKY
Because Kimsuky targets organizations across nations and industries, the number of organizations
that should be concerned is bigger than that of most nation-state APTs.
"So what we’ve been preaching everywhere," Barnhart explains, "is that there is strength in
numbers." With all of these groups all across the world, it’s critical that we all communicate
with one another. It is critical that we work together. Nobody should work in a vacuum."
And, he emphasizes, because Kimsuky exploits people as conduits for larger attacks, everyone
must be alert. "It’s important that we all have this baseline of : don’t click on links, and use your
multi-factor authentication."
Even North Korean hackers can be stopped with basic spear phishing precautions. "From
what we’re seeing, it does work if you actually take the time to follow your cyber hygiene,"
Barnhart said.
Educate and Train Staff : Train employees on how to identify phishing emails and malware
files on a regular basis. It is critical to educate people about the dangers of spearphishing emails.
Keep Software Updated : Update all software on a regular basis to ensure that known vulnerabilities
are fixed. This decreases the number of ways Kimsuky may acquire unwanted access.
Implement Multi-Factor Authentication (MFA) : MFA should be used wherever practicable,
especially for sensitive systems and data. Even if passwords are hacked, this gives an extra
degree of security.
Monitor for Suspicious Activity : Regularly monitor networks and systems for odd behavior
that might signal a breach.
Use Security Software : Use strong security software capable of detecting and blocking malware
and other dangerous behavior.
Collaborate and Share Information : Collaborate with other organizations and government
TEKUP Page 20
THREAT ACTOR ANALYSIS : KIMSUKY
In an ever-changing threat scenario, being aware and prepared are critical to remaining
safe. Cyber Threat Intelligence is one of the most effective threats to use against a specific
organization engaged in espionage activities. Obtaining knowledge on current flaws in the firm’s
assets, for example, will allow the company to take early action against potential threats.
F IGURE 1.14 – Company Vulnerabilities page under the Attack Surface Management Module
TEKUP Page 21
THREAT ACTOR ANALYSIS : KIMSUKY
IOC (AppleSeed) :
TEKUP Page 22
THREAT ACTOR ANALYSIS : KIMSUKY
TEKUP Page 23
GENERAL CONCLUSION
It can be difficult to attribute cyber actions to individual threat actors, however Kimsuky
is commonly considered to have links to the North Korean government. The goals of the
organization appear to be centered in intelligence collecting, with an emphasis on gaining
information about North Korea, its opponents, and regional geopolitical events.
Kimsuky’s cyber operations include a wide range of tactics, methods, and procedures (TTPs),
such as spear-phishing campaigns, social engineering, and the employment of custom-developed
malware. The organization has showed the capacity to evolve its cyber capabilities by adapting
its TTPs over time.
Kimsuky rose to prominence after participating in "Operation Troy" in 2013, a cyber espionage
effort targeting South Korean military organizations. The gang broadened its target reach to
include entities in the United States, displaying an opportunistic attitude by using global events
like as the COVID-19 epidemic to launch phishing efforts
Understanding Kimsuky’s strategies and aims is critical for cybersecurity experts and companies.
Because of the group’s persistent and dynamic nature, ongoing monitoring, threat intelligence
exchange, and proactive cybersecurity measures are required to reduce possible hazards.
The purpose of this paper is to give a thorough examination of Kimsuky’s historical actions,
milestones, and campaign transitions, providing insights into the group’s history and the shifting
environment of state-sponsored cyber threats.
TEKUP Page 24
BIBLIOGRAPHIE
TEKUP Page 25
BIBLIOGRAPHIE
TEKUP Page 26