North Korea-Linked Hackers Use GitHub as C2 Infrastructure to Attack South Korea
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写文章描述即可。 首先,我需要快速浏览一下文章内容。看起来这篇文章是关于Kimsuky这个朝鲜相关的威胁行为者发起的多阶段网络攻击活动。他们利用GitHub作为C2基础设施,针对韩国组织。 攻击链开始于通过钓鱼邮件发送的LNK文件,这些文件会部署诱饵PDF文档,并在后台静默执行PowerShell脚本。脚本会进行反分析检查,建立持久性,并将收集的数据外泄到GitHub仓库。 此外,GitHub还用于存储额外的模块和命令,帮助攻击者维持对被入侵系统的控制。文章还提到之前类似的活动使用了Xeno RAT和MoonPeak恶意软件家族,并且与AhnLab的报告相关联。 总结的时候需要包括主要攻击者、攻击手段、目标以及关键点,比如滥用GitHub和PowerShell脚本等。要确保在100字以内简洁明了地表达出来。 可能会这样组织语言:Kimsuky利用GitHub作为C2基础设施,通过钓鱼邮件发送LNK文件,部署诱饵PDF并执行PowerShell脚本进行反分析、建立持久性和数据外泄。攻击目标是韩国组织,并结合使用合法云平台和Windows工具以降低检测率。 最后检查一下字数是否符合要求,并确保没有使用任何不需要的开头语句。 </think> Kimsuky利用GitHub作为C2基础设施,通过钓鱼邮件发送LNK文件,部署诱饵PDF并执行PowerShell脚本进行反分析、建立持久性和数据外泄。攻击目标是韩国组织,并结合使用合法云平台和Windows工具以降低检测率。 2026-4-19 03:11:5 Author: infosecwriteups.com(查看原文) 阅读量:24 收藏

Excalibra

Press enter or click to view image in full size

Executive Summary

FortiGuard Labs has identified a sophisticated multi-stage attack campaign attributed to the North Korea-linked threat actor Kimsuky. The group is abusing GitHub as a living-off-the-land Command and Control (C2) infrastructure to target South Korean organizations.

The attack chain starts with obfuscated Windows Shortcut (LNK) files delivered via phishing emails. These LNK files deploy decoy PDF documents while silently executing PowerShell scripts in the background. The scripts perform anti-analysis checks, establish persistence through scheduled tasks, and exfiltrate collected data to GitHub repositories using hardcoded access tokens. Additional modules and commands are also retrieved from the same GitHub repositories.

Press enter or click to view image in full size

Decoy PDF

This campaign highlights the increasing trend of state-sponsored actors abusing legitimate cloud platforms and native Windows tools (LOLBins) to lower detection rates and maintain long-term access.

Attack Chain Breakdown

  1. Initial Access
    Phishing emails deliver obfuscated LNK files. When opened, victims see a legitimate-looking PDF document while a malicious PowerShell script runs silently in the background.
  2. Anti-Analysis & Evasion
    The PowerShell script scans for virtual machines, debuggers, and forensic tools. If any are detected, the script immediately terminates.
  3. Persistence
    If the environment is clean, the script extracts a Visual Basic Script (VBScript) and creates a scheduled task that runs the PowerShell payload every 30 minutes in a hidden window. This ensures execution after system reboots.
  4. Data Collection & Exfiltration
    The script gathers host information, saves results to a log file, and exfiltrates the data to GitHub repositories under attacker-controlled accounts, including:
  • motoralis
  • God0808RAMA
  • Pigresy80
  • entire73
  • pandora0009
  • brandonleeodd93-blip

5. C2 via GitHub
The same GitHub repositories are used to store additional modules and commands, allowing operators to maintain persistent control over compromised systems while blending into trusted platforms.

Press enter or click to view image in full size

Attacker’s GitHub

Connection to Previous Campaigns

Fortinet notes that earlier iterations of this activity delivered the Xeno RAT malware family. Similar GitHub-based C2 usage for distributing Xeno RAT and its variant MoonPeak was previously reported by ENKI and Trellix, both attributing the activity to Kimsuky.

Press enter or click to view image in full size

Attack chain

This disclosure coincides with AhnLab’s report on a similar LNK-based infection chain by Kimsuky that ultimately deploys a Python-based backdoor. In that variant, the LNK executes PowerShell which creates a hidden folder C:\windirr, drops decoy documents, and uses Dropbox as an interim C2 before downloading ZIP fragments from quickcon[.]store to deploy an XML Scheduled Task and the final Python implant.

Get Excalibra’s stories in your inbox

Join Medium for free to get updates from this writer.

Remember me for faster sign in

The Python backdoor supports downloading additional payloads and executing commands such as running shell scripts, listing directories, uploading/downloading/deleting files, and executing BAT, VBScript, or EXE files.

Related TTP Evolution

These findings also align with observations from ScarCruft (another DPRK-linked group), which has shifted from traditional LNK → BAT → shellcode chains to HWP OLE-based droppers for delivering RokRAT — a remote access trojan exclusively used by North Korean hacking groups.

URLs

hxxps://raw[.]githubusercontent[.]com/motoralis/singled/main/kcca/paper[.]jim

hxxps://api[.]github[.]com/repos/motoralis

SHA256

af0309aa38d067373c54b2a7774a32f68ab72cb2dbf5aed74ac784b079830184 TRAMS WINBOT AI Strategic Proposal.pdf.lnk

9c3f2bd300ad2ef8584cc48adc47aab61bf85fc653d923e106c73fc6ec3ea1dc 전략적 파트너십 상세 제안서.pdf.lnk

f20fde3a9381c22034f7ecd4fef2396a85c05bfd54f7db3ad6bcd00c9e09d421 상세 제안서 — 미래에셋 X AYC Fund.pdf.lnk

484a16d779d67c7339125ceac10b9abf1aa47f561f40058789bfe2acda548282 CONFIDENTIAL IOTRUST OFFER.pdf.lnk

c0866bb72c7a12a0288f434e16ba14eeaa35d3c4cff4a86046c553c15679c0b5 (CONFIDENTIAL) AIN x Mine Korea 2026.pdf.lnk

Researcher Comments

Security researcher Cara Lin from Fortinet stated:

“Threat actors are moving away from complex custom malware and instead leveraging native Windows tools for deployment, evasion, and persistence. By minimizing the use of PE files and heavily relying on LOLBins, attackers can target a broad audience with significantly lower detection rates.”

Recommendations

  • Strengthen email security gateways with advanced LNK and PowerShell inspection
  • Monitor abnormal access to GitHub, Dropbox, and other cloud repositories from endpoints
  • Implement strict application whitelisting and behavioral monitoring for scheduled tasks
  • Enable enhanced logging for PowerShell execution (Script Block Logging, Module Logging)
  • Regularly hunt for suspicious GitHub accounts and repositories with high-frequency commits from compromised environments

文章来源: https://infosecwriteups.com/north-korea-linked-hackers-use-github-as-c2-infrastructure-to-attack-south-korea-1bdcbaf9a9d8?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh