Inside the Kimsuky Leak: How the 'Kim' Dump Exposed North Korea's Credential Theft Playbook
Sept. 8, 2025, 9:58 a.m.
Description
A data breach attributed to a North Korean-affiliated actor known as "Kim" has provided new insights into Kimsuky (APT43) tactics and infrastructure. The actor's operations focus on credential-based intrusions targeting South Korean and Taiwanese networks, utilizing Chinese-language tools and infrastructure. The leaked data includes bash histories, phishing domains, OCR workflows, compiled stagers, and rootkit evidence, revealing a hybrid operation between DPRK attribution and Chinese resource utilization. The actor demonstrated sophisticated credential harvesting techniques, including targeting South Korea's Government Public Key Infrastructure (GPKI) and reconnaissance of Taiwanese government and academic institutions. The leak exposes the evolution of DPRK cyber capabilities and highlights the complex attribution challenges in modern nation-state cyber operations.
Tags
Date
- Created: Sept. 8, 2025, 9:35 a.m.
- Published: Sept. 8, 2025, 9:35 a.m.
- Modified: Sept. 8, 2025, 9:58 a.m.
Indicators
- 59.125.159.81
- 59.125.159.254
- 163.29.3.119
- 122.114.233.77
- 118.163.30.46
- 118.163.30.45
- 218.92.0.210
- wuzak.com
- webcloud-notice.com
- koala-app.com
- nid-security.com
Attack Patterns
- vmmisc.ko
- Kimsuky (APT43)
Additional Informations
- Technology
- Defense
- Government
- Taiwan