Kimsuky's Ongoing Evolution of KimJongRAT and Expanding Threats
This analysis examines the latest attack flow of the KimJongRAT variant, attributed to the North Korean threat actor Kimsuky. The malware has evolved to include both PE-based and PowerShell-based attack chains, which have been merged into a single workflow. The attackers use phishing emails for initial access, leveraging GitHub and Google Drive for malware distribution. The malware exfiltrates sensitive data including browser credentials, system information, and keystrokes. Additional activities by the same actor include credential theft through phishing sites and spear-phishing campaigns targeting South Korean users. The analysis provides evidence supporting the attribution to Kimsuky and highlights the ongoing development of variants and infrastructure, indicating successful attacks.
AI Analysis
Technical Summary
KimJongRAT is a remote access trojan (RAT) linked to the North Korean cyber espionage group Kimsuky. The latest evolution merges two previously separate attack chains—one based on Portable Executable (PE) files and the other on PowerShell scripts—into a single streamlined workflow, enhancing operational efficiency and evasion. Initial infection vectors rely heavily on spear-phishing emails that distribute malware payloads via reputable platforms such as GitHub and Google Drive, which helps bypass traditional security controls. Upon execution, KimJongRAT performs comprehensive reconnaissance and data theft activities, including harvesting browser credentials, capturing keystrokes, and collecting detailed system information. These capabilities enable attackers to maintain persistence, escalate privileges, and exfiltrate sensitive data stealthily. Additionally, Kimsuky conducts credential theft through phishing sites and targeted spear-phishing campaigns, primarily against South Korean users, but the infrastructure and tactics could be adapted to other regions. The malware employs various techniques mapped to MITRE ATT&CK tactics such as T1056.001 (keylogging), T1566.002 (spear-phishing), T1059.001/003/005 (PowerShell and command execution), and T1041 (data exfiltration), demonstrating a sophisticated multi-stage attack. Despite no known public exploits, the ongoing development and use of legitimate cloud services for distribution complicate detection and mitigation. This continuous evolution underscores Kimsuky's intent to maintain long-term espionage capabilities and adapt to defensive measures.
Potential Impact
For European organizations, the KimJongRAT threat poses significant risks primarily related to confidentiality breaches and potential operational disruptions. The malware’s ability to steal browser credentials and keystrokes can lead to unauthorized access to corporate accounts, intellectual property theft, and exposure of sensitive communications. Organizations involved in sectors such as defense, technology, research, and government—especially those with ties to South Korea or geopolitical interests in the Korean peninsula—are at heightened risk. The use of trusted platforms like GitHub and Google Drive for malware delivery increases the likelihood of successful initial compromise, potentially bypassing perimeter defenses. Data exfiltration activities could result in reputational damage, regulatory penalties under GDPR for data breaches, and loss of competitive advantage. Furthermore, the persistent nature of Kimsuky’s campaigns means that compromised networks could be used for extended espionage or as footholds for further attacks. The threat also stresses the importance of monitoring cloud service usage and user behavior analytics to detect anomalous activities. While the malware does not currently exploit zero-day vulnerabilities, its sophisticated multi-vector approach and use of social engineering make it a credible medium-level threat to European entities.
Mitigation Recommendations
1. Implement advanced email security solutions with enhanced phishing detection capabilities, including sandboxing and URL rewriting, to block spear-phishing attempts. 2. Enforce strict policies restricting execution of PowerShell scripts and PE files from untrusted sources, and enable PowerShell logging and transcription to monitor suspicious activities. 3. Monitor and restrict the use of cloud storage services like GitHub and Google Drive for downloading executables or scripts, employing data loss prevention (DLP) tools to flag unauthorized downloads. 4. Conduct targeted user awareness training focusing on spear-phishing recognition, especially for employees in sensitive roles or with access to critical systems. 5. Deploy endpoint detection and response (EDR) solutions capable of identifying keylogging, credential theft, and unusual process behaviors linked to KimJongRAT tactics. 6. Regularly audit and rotate credentials, implement multi-factor authentication (MFA) across all critical systems, and monitor for anomalous login patterns. 7. Establish network segmentation to limit lateral movement and data exfiltration paths. 8. Collaborate with threat intelligence providers to stay updated on Kimsuky’s evolving tactics and indicators of compromise (IOCs).
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden
Indicators of Compromise
- hash: 003ea91e9f52ecfdc3aadb2732e9b54c
- hash: 172dc997ca6022ec8dff0842e4c7b887
- hash: 2e8bf657d0301fb4c61e29f455d9058e
- hash: 5441d8a79411a261546beb1021cb5052
- hash: 66c4e2dd235c4d8d31abaf96e051585e
- hash: 677e77265c7ba52e825fc62023942213
- hash: 76d2cbad8502dce9e70e501c2378d3ff
- hash: 77f131bc8f660f85812c0d2e0da8e77e
- hash: 8b6580e14b8164e28e684d48691ddf4d
- hash: c0ee9a9046d82b294b3bf3bec997fc45
- hash: c69909ea3c131181fa7ae12155bcae17
- hash: d69fbf23e7492618cadc63d171010cd8
- hash: d9ecf148c88bfd9791758b3be1a9f459
- hash: e3a937869322cc4cd765fcbf16d5b9ea
- hash: f000df00a424cefcd8efff48ab167169
- hash: 3d053af7a7c8a14af8ec85fc12a66e8444e7e775
- hash: 7d098f0f41601216ffd2e7f06da56c70f1e671da
- hash: 83dfa760ca4087d7320afc224089898dfe508b21
- hash: f254b3f809f2a866d41b3fac5e51a150ddf98b5c
- hash: 5f04f60907089503730c6e31e4a5a8927d42e864168ec64556dfd8bcf2086a47
- hash: 7f4fc97870f4442477c9aafdb2523187b3026d73de30e9f90593b1ab0ce31da3
- hash: c24353e61826eb7187d1acabbd857ddb694ddfe130eb1f5195aadd39701565ca
- ip: 27.102.113.209
- ip: 142.11.248.98
- ip: 183.111.226.13
- ip: 27.102.113.107
- ip: 27.102.113.170
- ip: 27.102.113.20
- domain: cdn.glitch.global
- domain: daumcyd.ddns.net
- domain: natezlx.myvnc.com
- domain: nid-naverbpk.onthewifi.com
Kimsuky's Ongoing Evolution of KimJongRAT and Expanding Threats
Description
This analysis examines the latest attack flow of the KimJongRAT variant, attributed to the North Korean threat actor Kimsuky. The malware has evolved to include both PE-based and PowerShell-based attack chains, which have been merged into a single workflow. The attackers use phishing emails for initial access, leveraging GitHub and Google Drive for malware distribution. The malware exfiltrates sensitive data including browser credentials, system information, and keystrokes. Additional activities by the same actor include credential theft through phishing sites and spear-phishing campaigns targeting South Korean users. The analysis provides evidence supporting the attribution to Kimsuky and highlights the ongoing development of variants and infrastructure, indicating successful attacks.
AI-Powered Analysis
Technical Analysis
KimJongRAT is a remote access trojan (RAT) linked to the North Korean cyber espionage group Kimsuky. The latest evolution merges two previously separate attack chains—one based on Portable Executable (PE) files and the other on PowerShell scripts—into a single streamlined workflow, enhancing operational efficiency and evasion. Initial infection vectors rely heavily on spear-phishing emails that distribute malware payloads via reputable platforms such as GitHub and Google Drive, which helps bypass traditional security controls. Upon execution, KimJongRAT performs comprehensive reconnaissance and data theft activities, including harvesting browser credentials, capturing keystrokes, and collecting detailed system information. These capabilities enable attackers to maintain persistence, escalate privileges, and exfiltrate sensitive data stealthily. Additionally, Kimsuky conducts credential theft through phishing sites and targeted spear-phishing campaigns, primarily against South Korean users, but the infrastructure and tactics could be adapted to other regions. The malware employs various techniques mapped to MITRE ATT&CK tactics such as T1056.001 (keylogging), T1566.002 (spear-phishing), T1059.001/003/005 (PowerShell and command execution), and T1041 (data exfiltration), demonstrating a sophisticated multi-stage attack. Despite no known public exploits, the ongoing development and use of legitimate cloud services for distribution complicate detection and mitigation. This continuous evolution underscores Kimsuky's intent to maintain long-term espionage capabilities and adapt to defensive measures.
Potential Impact
For European organizations, the KimJongRAT threat poses significant risks primarily related to confidentiality breaches and potential operational disruptions. The malware’s ability to steal browser credentials and keystrokes can lead to unauthorized access to corporate accounts, intellectual property theft, and exposure of sensitive communications. Organizations involved in sectors such as defense, technology, research, and government—especially those with ties to South Korea or geopolitical interests in the Korean peninsula—are at heightened risk. The use of trusted platforms like GitHub and Google Drive for malware delivery increases the likelihood of successful initial compromise, potentially bypassing perimeter defenses. Data exfiltration activities could result in reputational damage, regulatory penalties under GDPR for data breaches, and loss of competitive advantage. Furthermore, the persistent nature of Kimsuky’s campaigns means that compromised networks could be used for extended espionage or as footholds for further attacks. The threat also stresses the importance of monitoring cloud service usage and user behavior analytics to detect anomalous activities. While the malware does not currently exploit zero-day vulnerabilities, its sophisticated multi-vector approach and use of social engineering make it a credible medium-level threat to European entities.
Mitigation Recommendations
1. Implement advanced email security solutions with enhanced phishing detection capabilities, including sandboxing and URL rewriting, to block spear-phishing attempts. 2. Enforce strict policies restricting execution of PowerShell scripts and PE files from untrusted sources, and enable PowerShell logging and transcription to monitor suspicious activities. 3. Monitor and restrict the use of cloud storage services like GitHub and Google Drive for downloading executables or scripts, employing data loss prevention (DLP) tools to flag unauthorized downloads. 4. Conduct targeted user awareness training focusing on spear-phishing recognition, especially for employees in sensitive roles or with access to critical systems. 5. Deploy endpoint detection and response (EDR) solutions capable of identifying keylogging, credential theft, and unusual process behaviors linked to KimJongRAT tactics. 6. Regularly audit and rotate credentials, implement multi-factor authentication (MFA) across all critical systems, and monitor for anomalous login patterns. 7. Establish network segmentation to limit lateral movement and data exfiltration paths. 8. Collaborate with threat intelligence providers to stay updated on Kimsuky’s evolving tactics and indicators of compromise (IOCs).
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.enki.co.kr/en/media-center/blog/kimsuky-s-ongoing-evolution-of-kimjongrat-and-expanding-threats"]
- Adversary
- Kimsuky
- Pulse Id
- 6924489d963d7a76a737f173
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash003ea91e9f52ecfdc3aadb2732e9b54c | — | |
hash172dc997ca6022ec8dff0842e4c7b887 | — | |
hash2e8bf657d0301fb4c61e29f455d9058e | — | |
hash5441d8a79411a261546beb1021cb5052 | — | |
hash66c4e2dd235c4d8d31abaf96e051585e | — | |
hash677e77265c7ba52e825fc62023942213 | — | |
hash76d2cbad8502dce9e70e501c2378d3ff | — | |
hash77f131bc8f660f85812c0d2e0da8e77e | — | |
hash8b6580e14b8164e28e684d48691ddf4d | — | |
hashc0ee9a9046d82b294b3bf3bec997fc45 | — | |
hashc69909ea3c131181fa7ae12155bcae17 | — | |
hashd69fbf23e7492618cadc63d171010cd8 | — | |
hashd9ecf148c88bfd9791758b3be1a9f459 | — | |
hashe3a937869322cc4cd765fcbf16d5b9ea | — | |
hashf000df00a424cefcd8efff48ab167169 | — | |
hash3d053af7a7c8a14af8ec85fc12a66e8444e7e775 | — | |
hash7d098f0f41601216ffd2e7f06da56c70f1e671da | — | |
hash83dfa760ca4087d7320afc224089898dfe508b21 | — | |
hashf254b3f809f2a866d41b3fac5e51a150ddf98b5c | — | |
hash5f04f60907089503730c6e31e4a5a8927d42e864168ec64556dfd8bcf2086a47 | — | |
hash7f4fc97870f4442477c9aafdb2523187b3026d73de30e9f90593b1ab0ce31da3 | — | |
hashc24353e61826eb7187d1acabbd857ddb694ddfe130eb1f5195aadd39701565ca | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip27.102.113.209 | CC=KR ASN=AS45996 daou technology | |
ip142.11.248.98 | CC=US ASN=AS54290 hostwinds llc. | |
ip183.111.226.13 | CC=KR ASN=AS4766 korea telecom | |
ip27.102.113.107 | CC=KR ASN=AS45996 daou technology | |
ip27.102.113.170 | CC=KR ASN=AS45996 daou technology | |
ip27.102.113.20 | CC=KR ASN=AS45996 daou technology |
Domain
| Value | Description | Copy |
|---|---|---|
domaincdn.glitch.global | — | |
domaindaumcyd.ddns.net | — | |
domainnatezlx.myvnc.com | — | |
domainnid-naverbpk.onthewifi.com | — |
Threat ID: 69244e1100c839aeb2084876
Added to database: 11/24/2025, 12:22:41 PM
Last enriched: 11/24/2025, 12:23:52 PM
Last updated: 1/8/2026, 10:09:45 PM
Views: 422
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging
MediumTargets high value telecommunications infrastructure in South Asia
MediumChina-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
MediumDeep Malware and Phishing Analysis - Breaking Down an Access-Code-Gated Malware Delivery Chain
MediumFake Browser Updates Targeting WordPress Administrators via Malicious Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.