Inside DPRK Operations: New Infrastructure Uncovered Across Global Campaigns
Dec. 21, 2025, 7:37 p.m.
Description
North Korean state-sponsored threat actors, including Lazarus and Kimsuky, continue to conduct widespread hacking operations for intelligence gathering, financial gain, and access. The investigation uncovered previously unconnected operational assets, revealing active tool-staging servers, credential theft environments, FRP tunneling nodes, and certificate-linked infrastructure. Key findings include a new Linux variant of the Badcall backdoor, extensive credential harvesting toolkits in open directories, and widespread deployment of Fast Reverse Proxy (FRP) instances. The analysis highlights consistent operational patterns across DPRK campaigns, such as reusing infrastructure, deploying identical FRP configurations, and leveraging shared certificates, providing defenders with actionable intelligence to proactively track DPRK activity.
Tags
Date
- Created: Dec. 18, 2025, 9:40 a.m.
- Published: Dec. 18, 2025, 9:40 a.m.
- Modified: Dec. 21, 2025, 7:37 p.m.
Indicators
- 36541fad68e79cdedb965b1afcdc45385646611aa72903ddbe9d4d064d7bffb9
- cc307cfb401d1ae616445e78b610ab72e1c7fb49b298ea003dd26ea80372089a
- a3876a2492f3c069c0c2b2f155b4c420d8722aa7781040b17ca27fdd4f2ce6a9
- bc7bd27e94e24a301edb3d3e7fad982225ac59430fc476bda4e1459faa1c1647
- 85045d9898d28c9cdc4ed0ca5d76eceb457d741c5ca84bb753dde1bea980b516
- a5350b1735190a9a275208193836432ed99c54c12c75ba6d7d4cb9838d2e2106
- 24d5dd3006c63d0f46fb33cbc1f576325d4e7e03e3201ff4a3c1ffa604f1b74a
- ff32bc1c756d560d8a9815db458f438d63b1dcb7e9930ef5b8639a55fa7762c9
- 207.254.22.248
- 182.136.123.102
- 118.123.54.71
- 154.216.177.215
- 119.6.56.194
- 61.139.89.11
- 125.67.171.158
- 125.65.88.195
- 119.6.121.143
- 23.27.177.183
- 182.136.120.52
- 23.27.140.49
Additional Informations
- secondshop.store