North Korea-linked hackers target embassies in Seoul in new espionage campaign
朝鲜相关黑客组织对韩国外国大使馆实施网络间谍活动,伪装成外交邮件传播恶意软件XenoRAT。该活动自3月起持续至今,疑似由朝鲜Kimsuky组织发动,并可能与中国有关。攻击者利用钓鱼邮件诱骗目标打开恶意附件以获取系统控制权。 2025-8-19 14:30:50 Author: therecord.media(查看原文) 阅读量:18 收藏

A North Korea-linked hacker group carried out a months-long espionage campaign against foreign embassies in South Korea, disguising its attacks as routine diplomatic correspondence, researchers found.

The operation, active since March and still ongoing, is believed to be linked to North Korea’s Kimsuky group, also known as APT43, and has targeted at least 19 embassies and foreign ministries, according to a report published this week by cybersecurity firm Trellix.

Although the campaign was attributed to Pyongyang-backed hackers, the report suggests possible ties to China. The hackers’ activity closely aligned with Chinese working hours and paused during Chinese national holidays, but not during North or South Korean holidays. These patterns raise the possibility that the group is operating from Chinese territory or relying on Chinese contractors, Trellix said.

The attackers posed as foreign diplomats and officials, sending emails that appeared to include meeting minutes, letters from ambassadors, or event invitations. Attachments disguised as PDFs inside password-protected ZIP files deployed a variant of the XenoRAT remote access trojan, giving hackers full control of infected systems.

“The spear-phishing content was carefully crafted to mimic legitimate diplomatic correspondence. Many emails included official signatures, diplomatic terminology, and references to real events,” the researchers said. “Such precise timing and context significantly increased the likelihood that targets would open malicious attachments.”

One phishing email impersonated a U.S. Embassy protocol officer with an invite to an Independence Day event, while others spoofed European diplomats or promoted international forums. Trellix said it identified decoy documents crafted in multiple languages, including Korean, English, Persian, Arabic, French and Russian.

The malware used in the campaign, XenoRAT, is an open-source remote access trojan with advanced features, including remote control, keystroke logging and access to the webcam and microphone.

Once installed on victims’ devices, the malware gathered detailed information about their systems and exfiltrated the data through GitHub’s developer platform to evade detection. The attackers also relied on Dropbox, Google Drive and Korean services such as Daum to host malicious files, Trellix said.

espionage-campaign-3.jpg

Image: Trellix

Kimsuky has been active since at least 2012, targeting governments, think tanks, academics, and media organizations across Asia, Europe, Japan, Russia and the United States. In 2023, Washington and its Pacific allies imposed sanctions on the group, accusing it of collecting intelligence to support North Korea’s foreign policy and sanctions-evasion efforts.

U.S. officials have previously said North Korean cyber units often operate abroad, including from China and Russia, to avoid sanctions. Trellix said its findings support the view that while the latest campaign is linked to Kimsuky, the operators may be based in China or culturally Chinese.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/north-korean-hackers-target-foreign-embassies
如有侵权请联系:admin#unsafe.sh