text
stringlengths
0
1.99k
"Kimsuky is a North Korean state-backed Advanced Persistent Threat
that targets think tanks, industry, nuclear power operators and
government for espionage purposes. It is being designated pursuant
to E.O. 13687, for being an agency, instrumentality, or a
controlled entity of the Government of North Korea."
---
We refer to this particular member as "KIM" for the sake of this article.
KIM is not your friend.
The dump includes many of Kimsuky's backdoors and their tools as well as the
internal documentation. It shows a glimpse how openly "Kimsuky" cooperates
with other Chinese APTs and shares their tools and techniques.
Some of these tools may already be known to the community: You have seen
their scans and found their server side artifacts and implants. Now you
shall also see their clients, documentation, passwords, source code, and
command files...
As a freebie, we also give you a backup of their VPS that they used for
spear-phishing attacks.
This article is an invitation for threat hunters, reverse engineers and
hackers, -Enjoy.
The meat of the article is split into 3 parts:
-- 1.x The dumps, log files, history files, password lists, ..
-- 2.x Their backdoors, tools, payloads,
-- 3.x OSINT on the threat actor
The dump is available at:
1. http://gdlvc66enozrke2pbcg2cnyhmfhzu77wo5g4qluebnas3qiqn4mgerid.onion
2. https://ddosecrets.com/article/apt-down-the-north-korea-files
3. https://drive.proton.me/urls/ZQ1235FY7C#P0khjXI2uEtS
We have informed the South Korean victims before the release of this article
and to give them time to change the login credentials. We have not
informed KIM: The credentials to his VPS and domain registrar are still
valid (as of this morning). Good luck.
--[ F. Dear Kimsuky, you are no hacker
What defines a Hacker? Somebody clever, extremely clever, who enjoys using
technology beyond its intended purpose and who does so without causing
harm, is free of any political agenda and has no monetary incentives. They
take no money and no rewards. They follow nobody and have no goal beyond
expressing their creativity.
An artist.
Kimsuky, you are not a hacker. You are driven by financial greed, to enrich
your leaders, and to fulfill their political agenda. You steal from others
and favour your own. You value yourself above the others: You are morally
perverted.
I am a Hacker and I am the opposite to all that you are. In my realm, we
are all alike. We exist without skin color, without nationality, and without
political agenda. We are slaves to nobody.
I hack to express my creativity and to share my knowledge with other
artists like me. To contribute, share, and further the knowledge of all man
kind. For the beauty of the baud alone.
You hack for all the wrong reasons.
--[ 1. The Dumps
>>> Be mindful when opening files from the dump. <<<
>>> You have been warned. <<<
This paragraph gives a short overview of the dumps and then takes a closer
look at three initial findings:
* Logs showing an attack against The Defense Counterintelligence Command
* Access to the South Korea Ministry of foreign Affairs
* Access to internal South Korean Gov network
* ...and many more files we did not had the time yet to look at. #ENJOY
The first dump is from KIM's guest VM and the second is from his public VPS.
Both dumps were retrieved around the 10th of June 2025.
The first dump:
---------------
- A screenshot of his Desktop (kim_desktop.jpg).
- Linux Dev System (VM, running Deepin 20.9 Linux).
The guest VM had the host's C:\ mounted (hgfs). Dumped included.
- A listing of all files can be found in ./file-lists.
- About 20,000 entries in the Brave & Chrome history. Revealing many email
addresses (jeder97271@wuzak.com, xocaw75424@weiby.com, ..), sites KIM
visited and tools KIM downloaded. All Chrome extensions such as spoofing
the User-Agent, Proxy SwitchyOmega, a Cookie Editor and many others.
- The file `ko 图文编译 .doc` is a manual how to operate one of their
backdoors. There is also a very officially sounding statement(translated):
"it is forbidden to use the backdoor outside of its designated use".