Article Details
Scrape Timestamp (UTC): 2025-02-06 18:55:59.027
Original Article Text
Click to Toggle View
Kimsuky hackers use new custom RDP Wrapper for remote access. The North Korean hacking group known as Kimsuky was observed in recent attacks using a custom-built RDP Wrapper and proxy tools to directly access infected machines. This is a sign of shifting tactics for Kimsuky, according to AhnLab SEcurity Intelligence Center (ASEC), who discovered the campaign. ASEC says the North Korean hackers now use a diverse set of customized remote access tools instead of relying solely on noisy backdoors like PebbleDash, which is still used. Kimsuky's latest attack chain The latest infection chain starts with a spear-phishing email containing a malicious shortcut (.LNK) file attachment disguised as a PDF or Word document. The emails contain the recipient's name and correct company names, suggesting that Kimsuky performed reconnaissance before the attack. Opening the .LNK file triggers PowerShell or Mshta to retrieve additional payloads from an external server, including: Custom RDP Wrapper RDP Wrapper is a legitimate open-source tool designed to enable Remote Desktop Protocol (RDP) functionality on Windows versions that do not natively support it, like Windows Home. It acts as a middle layer, allowing users to enable remote desktop connections without modifying system files. Kimsuky's version altered export functions to bypass antivirus detection and likely differentiates its behavior enough to evade signature-based detection. The main advantage of using a custom RDP Wrapper is detection evasion, as RDP connections are often treated as legitimate, allowing Kimsuky to stay under the radar for longer. Moreover, it provides a more comfortable GUI-based remote control, compared to shell access via malware, and can bypass firewalls or NAT restrictions via relays, allowing RDP access from outside. ASEC reports that once Kimsuky secures their foothold on the network, they drop secondary payloads. These include a keylogger that captures keystrokes and stores them in text files in system directories, an infostealer (forceCopy) that extracts credentials saved on web browsers, and a PowerShell-based ReflectiveLoader that enables in-memory payload execution. Overall, Kimsuky is a persistent and evolving threat and one of North Korea's most prolific cyber-espionage threat groups devoted to collecting intelligence. ASEC's latest findings indicate that the threat actors switch to stealthier remote access methods for prolonged dwell times in compromised networks.
Daily Brief Summary
North Korean hacking group Kimsuky reportedly adopted a custom-built RDP Wrapper for remote access, indicating a shift in their attack methods.
AhnLab Security Intelligence Center discovered the campaign, highlighting Kimsuky's move away from noisy backdoors towards more stealthy remote access tools.
Kimsuky's recent attacks involve spear-phishing emails with malicious attachments disguised as legitimate documents to deploy their toolkit.
The toolkit includes an altered RDP Wrapper to bypass antivirus detection, enabling undetected remote access and control.
Secondary payloads dropped by Kimsuky on the compromised networks include keyloggers, information stealers, and in-memory payload execution tools.
The group's use of a broad set of custom remote access tools aims to maintain prolonged access to compromised networks for espionage purposes.
The upgraded attack chain and tools underline Kimsuky's persistent efforts in enhancing its cyber-espionage capabilities.