text stringlengths 0 1.99k |
|---|
"Kimsuky is a North Korean state-backed Advanced Persistent Threat |
that targets think tanks, industry, nuclear power operators and |
government for espionage purposes. It is being designated pursuant |
to E.O. 13687, for being an agency, instrumentality, or a |
controlled entity of the Government of North Korea." |
--- |
We refer to this particular member as "KIM" for the sake of this article. |
KIM is not your friend. |
The dump includes many of Kimsuky's backdoors and their tools as well as the |
internal documentation. It shows a glimpse how openly "Kimsuky" cooperates |
with other Chinese APTs and shares their tools and techniques. |
Some of these tools may already be known to the community: You have seen |
their scans and found their server side artifacts and implants. Now you |
shall also see their clients, documentation, passwords, source code, and |
command files... |
As a freebie, we also give you a backup of their VPS that they used for |
spear-phishing attacks. |
This article is an invitation for threat hunters, reverse engineers and |
hackers, -Enjoy. |
The meat of the article is split into 3 parts: |
-- 1.x The dumps, log files, history files, password lists, .. |
-- 2.x Their backdoors, tools, payloads, |
-- 3.x OSINT on the threat actor |
The dump is available at: |
1. http://gdlvc66enozrke2pbcg2cnyhmfhzu77wo5g4qluebnas3qiqn4mgerid.onion |
2. https://ddosecrets.com/article/apt-down-the-north-korea-files |
3. https://drive.proton.me/urls/ZQ1235FY7C#P0khjXI2uEtS |
We have informed the South Korean victims before the release of this article |
and to give them time to change the login credentials. We have not |
informed KIM: The credentials to his VPS and domain registrar are still |
valid (as of this morning). Good luck. |
--[ F. Dear Kimsuky, you are no hacker |
What defines a Hacker? Somebody clever, extremely clever, who enjoys using |
technology beyond its intended purpose and who does so without causing |
harm, is free of any political agenda and has no monetary incentives. They |
take no money and no rewards. They follow nobody and have no goal beyond |
expressing their creativity. |
An artist. |
Kimsuky, you are not a hacker. You are driven by financial greed, to enrich |
your leaders, and to fulfill their political agenda. You steal from others |
and favour your own. You value yourself above the others: You are morally |
perverted. |
I am a Hacker and I am the opposite to all that you are. In my realm, we |
are all alike. We exist without skin color, without nationality, and without |
political agenda. We are slaves to nobody. |
I hack to express my creativity and to share my knowledge with other |
artists like me. To contribute, share, and further the knowledge of all man |
kind. For the beauty of the baud alone. |
You hack for all the wrong reasons. |
--[ 1. The Dumps |
>>> Be mindful when opening files from the dump. <<< |
>>> You have been warned. <<< |
This paragraph gives a short overview of the dumps and then takes a closer |
look at three initial findings: |
* Logs showing an attack against The Defense Counterintelligence Command |
* Access to the South Korea Ministry of foreign Affairs |
* Access to internal South Korean Gov network |
* ...and many more files we did not had the time yet to look at. #ENJOY |
The first dump is from KIM's guest VM and the second is from his public VPS. |
Both dumps were retrieved around the 10th of June 2025. |
The first dump: |
--------------- |
- A screenshot of his Desktop (kim_desktop.jpg). |
- Linux Dev System (VM, running Deepin 20.9 Linux). |
The guest VM had the host's C:\ mounted (hgfs). Dumped included. |
- A listing of all files can be found in ./file-lists. |
- About 20,000 entries in the Brave & Chrome history. Revealing many email |
addresses (jeder97271@wuzak.com, xocaw75424@weiby.com, ..), sites KIM |
visited and tools KIM downloaded. All Chrome extensions such as spoofing |
the User-Agent, Proxy SwitchyOmega, a Cookie Editor and many others. |
- The file `ko 图文编译 .doc` is a manual how to operate one of their |
backdoors. There is also a very officially sounding statement(translated): |
"it is forbidden to use the backdoor outside of its designated use". |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.