Kimsuky Attack Disguised as Sex Offender Notification Information

Sept. 24, 2025, 12:03 p.m.

Description

In late July 2025, an organized APT attack using shortcut files was discovered, attributed to the North Korean Kimsuky group. The attackers distribute decoy zip files containing password-protected documents and a disguised shortcut file. When executed, it connects to a C2 server, downloads encrypted payloads, and performs various malicious activities. These include collecting sensitive information from browsers, cryptocurrency wallets, messaging apps, and system files. The collected data is encrypted and sent to the C2 server, which can issue additional commands for remote execution. The attack employs anti-VM techniques and establishes persistence through registry modifications. It also includes a separate malicious DLL for browser process injection.

Date

  • Created: Sept. 24, 2025, 10:38 a.m.
  • Published: Sept. 24, 2025, 10:38 a.m.
  • Modified: Sept. 24, 2025, 12:03 p.m.

Indicators

  • c24353e61826eb7187d1acabbd857ddb694ddfe130eb1f5195aadd39701565ca
  • 6730d86c8e24e0c2ae0bb1fb65d15b5c303855927719d5f572fdc0ff1f623de3
  • 1d01eab612da7d635e6b92395ead126e3e07b7987b3a38c8831e25cbcd5456b7
  • https://yfews.mailhubsec.com/comm/vpwepi.hta
  • https://yajxu.mailhubsec.com/
  • yfews.mailhubsec.com
  • yajxu.mailhubsec.com