SOCRadar® Cyber Intelligence Inc. | APT Profile: Kimsuky
Home

Resources

Blog
Jul 25, 2023
15 Mins Read

APT Profile: Kimsuky

In cyberspace, the Korean Peninsula has been a hotbed of activity for a while. With conflict unfolding between North and South Korea, North Korean Advanced Persistent Threats (APTs) are emerging as the weapon of choice. Among these, one name stands out: Kimsuky.

North Korean APTs have been responsible for some of the most audacious cyber-attacks in recent history. According to a United Nations report, North Korean hackers have pilfered over $2 billion through cyber-attacks on banks and cryptocurrency exchanges. These funds are believed to be channeled into North Korea’s weapons programs.

Illustration of North Korea Cyber Threat Actors (Generated using Bing Image Creation powered by Dall-E)
Figure 1. Illustration of North Korea Cyber Threat Actors (Generated using Bing Image Creation powered by Dall-E)

Enter Kimsuky, a North Korean APT group that has been operating for a while and recently started to be heard in the media again. But what makes Kimsuky this famous? 

This blog post aims to shed light on Kimsuky, providing an in-depth profile of this threat actor. We will explore who they are, how they operate, the tools and vulnerabilities they exploit, their targets, and their operations. We will also provide some security recommendations to help protect against Kimsuky’s attacks. Understanding the threat posed by Kimsuky is the first step towards building a robust defense against cyber-espionage activities.

Who is Kimsuky?

Kimsuky (or APT43), a name that sends tides through the cybersecurity community, is a cyber-espionage group believed to be operating out of North Korea. First observed in 2013, Kimsuky has been determined to pursue sensitive information, primarily focusing on South Korea and extending its reach to the United States and Europe.

Aliases of Kimsuky (Source: SOCRadar)
Figure 2. Aliases of Kimsuky (Source: SOCRadar)

How Does Kimsuky Attack?

Kimsuky employs a range of tactics to infiltrate systems and gathers sensitive information. Let’s break down their modus operandi:

Spearphishing Emails

One of the primary methods Kimsuky uses to gain unauthorized access to systems is through spearphishing emails. These are targeted emails sent to specific individuals or organizations. The emails often contain malicious attachments or links. For example, Kimsuky has been known to use Hangul Word Processor (HWP) files, which are popular in South Korea. These files contain exploits for known vulnerabilities or a dropper disguised as a document.

Legitimate spearphishing mail containing malicious HWP file, used in Smoke Screen campaign  (Source: ESTsecurity)
Figure 3. Legitimate spearphishing mail containing malicious HWP file, used in Smoke Screen campaign  (Source: ESTsecurity)

Malicious Chrome Extensions 

Kimsuky has also been observed using malicious Google Chrome extensions to infect victims. They lure victims to websites that appear legitimate and prompt them to install a Chrome extension. Once installed, this extension can steal cookies and passwords from the browser.

Kimsuky’s Malicious Google Chrome Extension Sharpext’s process flow (Source: Volexity)
Figure 4. Kimsuky’s Malicious Google Chrome Extension Sharpext’s process flow (Source: Volexity)

Exploiting Vulnerabilities 

Kimsuky is known for exploiting known vulnerabilities in software. For instance, they have exploited a vulnerability in Microsoft Word (CVE-2017-0199) to execute malicious code. By keeping an eye on newly discovered vulnerabilities and exploiting them before they are patched, Kimsuky can gain access to systems with minimal detection.

Vulnerability intelligence screenshot of CVE-2017-0199 (Source: SOCRadar)
Figure 5. Vulnerability intelligence screenshot of CVE-2017-0199 (Source: SOCRadar)

Use of Malware 

Once Kimsuky has gained access to a system, they deploy malware to maintain control. One such malware is BabyShark, which is used to gather data from the infected system. They also use keyloggers and remote control software to monitor the user’s actions and gather further information.

Kimsuky’s attacks are well-planned and executed with precision. Their ability to use a combination of spearphishing, exploiting vulnerabilities, and deploying malware makes them a formidable threat.

Which Tools and Vulnerabilities Used by Kimsuky?

Kimsuky employs a variety of tools and exploits several vulnerabilities to carry out its cyber espionage campaigns. Here’s a closer look:

Tools Used by Kimsuky:

Kimsuky’s toolkit is extensive and varied, reflecting a high degree of sophistication and adaptability. Their ability to exploit a range of vulnerabilities and deploy a diverse set of tools makes them a formidable and persistent threat.

Observed Malware and Software associated with Kimsuky (Source:SOCRadar)
Figure 6. Observed Malware and Software associated with Kimsuky (Source:SOCRadar)

BabyShark Malware 

One of the prominent tools in Kimsuky’s arsenal is the BabyShark malware. This malware is used to collect data from infected systems. It is often delivered through spearphishing emails as a second-stage payload.

Gold Dragon 

Gold Dragon, a data-gathering tool that was first seen in December 2017 during a spearphishing campaign in Korea targeting the same Olympic-linked organizations. The tool has observed that it was used in operations aimed at entities connected to the 2018 Pyeongchang Winter Olympics. 

As a second-stage backdoor implant, Gold Dragon ensured a lasting presence on the victim’s system after the execution of a file-less, PowerShell-based initial attack that used steganography

The capabilities of this malware included basic reconnaissance, data extraction, and the ability to download additional components from its command and control server.

SWEETDROP 

SWEETDROP is a malware dropper that is actively used by Kimsuky during the Covid-19 pandemic. It is a C/C++ Windows application that collects basic system information and is capable of downloading and executing additional stages such as download and execution of Kimsuky’s backdoor “BITTERSWEET”.

Vulnerabilities Exploited by Kimsuky: 

Kimsuky’s use of these tools and exploitation of vulnerabilities demonstrates their adaptability and resourcefulness. They are capable of using both custom and off-the-shelf tools to achieve their objectives.

Observed CVEs used by Kimsuky (Source: SOCRadar)
Figure 7. Observed CVEs used by Kimsuky (Source: SOCRadar)

CVE-2017-0199 

Kimsuky exploited this vulnerability to deliver the BabyShark malware. This is a vulnerability in Microsoft Word that allows a specially crafted file to execute code. 

HWP Exploits 

Hangul Word Processor (HWP) files are widely used in South Korea. Kimsuky has been known to use HWP files that contain exploits for known vulnerabilities to install droppers on systems.

CVE-2015-2545 

This is a vulnerability in Microsoft Office that allows for remote code execution through specially crafted EPS image files. Kimsuky has exploited this vulnerability to execute malicious code and install malware on target systems.

CVE-2019-0604 

Kimsuky has exploited this vulnerability in Microsoft SharePoint to execute arbitrary code. By sending a specially crafted SharePoint application package, attackers can run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.

What are the Targets of Kimsuky?

Kimsuky mainly targets South Korean think tanks, industry, nuclear power operators, and the Ministry of Unification for espionage purposes.

Targeted Sectors 

Kimsuky’s cyber-espionage campaigns are highly targeted. They focus on specific sectors and countries that align with the strategic interests of North Korea. The most targeted industries by Kimsuky are:

  • Government Institutions,
  • Think Tanks and Academic Institutions,
  • Media Outlets (Publishing Services),
  • Critical Infrastructure (Energy & Utilities, Space & Defence, National Security&International Affairs),
  • Cryptocurrency & NFT (Banking, Finance),
  • Information Services

Targeted Countries

Kimsuky’s activities are believed to align with North Korea’s foreign intelligence agency, the Reconnaissance General Bureau (RGB), and the group’s main targets are mostly:

  • South Korea
  • United States
  • European Countries
Countries affected by Kimsuky (Source: SOCRadar)
Figure  8. Countries affected by Kimsuky (Source: SOCRadar)

Operations of Kimsuky

Kimsuky has been involved in several distinct operations, each with specific targets and objectives. Here are some of the notable operations attributed to Kimsuky:

Campaign Page of Recon Shark, the tool used by Kimsuky (Source: SOCRadar)
Figure 9. Campaign Page of Recon Shark, the tool used by Kimsuky (Source: SOCRadar)

South Korean Nuclear Reactor Cyberattack 

Timeframe: December 2014

In this operation, Kimsuky was implicated in cyberattacks against South Korea’s nuclear reactor operator. The attack raised concerns about critical infrastructure security and highlighted the extent of Kimsuky’s capabilities.

Operation Stolen Pencil 

Timeframe: Active since at least May 2018

Operation Stolen Pencil was a campaign that targeted academic institutions. Kimsuky used spearphishing emails to lure victims to websites that appeared to be legitimate academic organizations. The victims were then prompted to install a malicious Google Chrome extension. This extension was capable of stealing cookies and passwords from the browser.

Foreign Ministries and Think Tanks Spearphishing Campaign 

Timeframe: Late 2018

Kimsuky conducted a spearphishing campaign targeting multiple foreign ministries and think tanks. The spearphishing emails contained malicious Microsoft Word documents that exploited a known vulnerability (CVE-2017-0199) to download and execute the BabyShark malware. The targets included the United Nations Security Council, the U.S. Department of State, and several think tanks based in the U.S. and Europe.

Operation AppleSeed 

Timeframe: 2021

In this operation, Kimsuky was observed distributing a backdoor known as AppleSeed. The group used spearphishing emails to target South Korean government agencies. The emails contained malicious attachments that, when opened, would install the AppleSeed backdoor on the victim’s system. This backdoor allowed Kimsuky to exfiltrate data and execute commands remotely.

Operation CloudDragon 

Timeframe: 2023

Recently, Kimsuky has been linked to a new campaign dubbed Operation CloudDragon. This operation involves the use of social engineering, spearphishing, and custom malware to target think tanks, news media, and experts on North Korean affairs. Kimsuky impersonated journalists and used spoofed URLs, and weaponized Office documents to steal credentials and gather strategic intelligence.

Emulating Kimsuky’s Espionage Operations 

Timeframe: April 2023

AttackIQ released four new attack graphs that emulate the espionage activities of Kimsuky. This politically motivated North Korean adversary has been involved in sophisticated espionage operations, and the attack graphs provide insights into their tactics and techniques.

Social Engineering and Spearphishing Campaigns 

Timeframe: June 2023

According to a joint Cybersecurity Advisory by U.S. and Republic of Korea (ROK) agencies, Kimsuky has been involved in social engineering campaigns targeting think tanks, academia, and news media. The advisory provides detailed information on how Kimsuky actors operate and warning signs of spearphishing campaigns. North Korea relies heavily on intelligence gained from these operations. Kimsuky has been involved in impersonation campaigns and has been targeting governments, political organizations, and more for intelligence collection.

Example of an email that is impersonating a think tank researcher (Source: Joint Cybersecurity Advisory)
Figure 10. Example of an email that is impersonating a think tank researcher (Source: Joint Cybersecurity Advisory)

These recent operations highlight Kimsuky’s ongoing efforts to gather intelligence and the evolving nature of their tactics.

Connections with Other APT Groups

Kimsuky is one of several APT groups believed to be operating out of North Korea. While Kimsuky operates independently, there are indications that it may have connections with other North Korean APT groups.

Lazarus 

One such group is the Lazarus Group, which is known for its global cyber espionage and cybercrime campaigns. The Lazarus Group has been implicated in high-profile attacks, including the Sony Pictures hack in 2014 and the WannaCry ransomware attack in 2017.

While there is no direct evidence linking Kimsuky to the Lazarus Group, both groups share similarities in their tactics and targets. Additionally, both groups are believed to be sponsored by the North Korean government, which suggests that they may share resources or information.

APT37 (Reaper) 

Another North Korean APT group, known as APT37 or Reaper, has been active since at least 2012. Like Kimsuky, APT37 has primarily targeted South Korea but has also conducted operations against Japan, Vietnam, and the Middle East. APT37 is known for using zero-day vulnerabilities and malware in its cyber-espionage campaigns.

Again, while there is no concrete evidence of direct collaboration between Kimsuky and APT37, the similarities in their targets and tactics suggest that they may be part of a coordinated effort by the North Korean government to conduct cyber espionage.

In summary, Kimsuky, while operating independently, is part of a larger ecosystem of North Korean APT groups. The shared tactics, targets, and likely state sponsorship suggest that these groups may be loosely connected or at least aligned in their objectives.

Some of the samples’ strings contain the “Kim” keyword:

  • “kimm.r-naver[.]com”,
  • “kimsukyang and Kim asdfa” the owner of “iop110112@hotmail[.]com and rsh1213@hotmail[.]com domains extracted in one of the first observations.
  • And other IoCs contain “tjkim”, “kimyfrenotsure”, “kimshan”, “Kim_Summit”, etc.

These and similar IoCs can be found on the Kimsuky Threat Actor page on SOCRadar XTI’s Cyber Threat Intelligence Module

SOCRadar XTI Threat Actor page of Kimsuky (Source: SOCRadar)
Figure 11. SOCRadar XTI Threat Actor page of Kimsuky (Source: SOCRadar)

So, it is also possible to conclude from these IoCs that Kimsuky is a separate threat actor and that it stands out from other North Korean threat actors.

Conclusion

Kimsuky, a North Korean cyber-espionage group, has been a persistent and evolving threat since it was first observed in 2013. With a focus on intelligence gathering, Kimsuky has targeted the government institutions, think tanks, academic institutions, and critical infrastructure primarily in South Korea but also in the United States and Europe.

Kimsuky’s tactics are sophisticated and varied, ranging from spearphishing emails and exploiting software vulnerabilities to using malicious Chrome extensions and custom malware. The group’s ability to adapt and evolve its tactics makes it particularly dangerous.

Furthermore, Kimsuky is not operating in isolation. It is part of a larger network of North Korean APT groups, including the Lazarus Group and APT37. These groups, while operating independently, share similarities in tactics and targets, suggesting a coordinated effort by the North Korean government.

The global reach and evolving nature of Kimsuky’s operations highlight the importance of vigilance and robust cybersecurity measures. As Kimsuky continues to adapt and evolve, so too must the defenses against them.

Security Recommendations Against Kimsuky

Educate and Train Staff: Regularly train staff to recognize phishing emails and malicious attachments. Educating users on the risks of spearphishing emails is crucial.

Keep Software Updated: Regularly update all software to ensure that known vulnerabilities are patched. This reduces the avenues through which Kimsuky can gain unauthorized access.

Implement Multi-Factor Authentication (MFA): Use MFA wherever possible, especially for critical systems and data. This adds an additional layer of security, even if passwords are compromised.

Monitor for Suspicious Activity: Regularly monitor networks and systems for unusual activity that could indicate a breach.

Use Security Software: Employ robust security software that can detect and block malware and other malicious activity.

Collaborate and Share Information: Work with other organizations and government agencies to share information on threats and best practices for defense.

Develop an Incident Response Plan: Have a plan in place for responding to security incidents. Knowing how to respond in the event of a breach is critical.

By taking these steps, organizations can reduce their risk of falling victim to Kimsuky and other cyberespionage groups. 

In an ever-evolving threat landscape, staying informed and being prepared are key to being out of danger. Cyber Threat Intelligence is among the best threats to take against a specific group conducting espionage activities. For example, obtaining information about the existing weaknesses in the assets owned by the company will enable the company to take early action against possible threats.

Company Vulnerabilities page under the Attack Surface Management Module of SOCRadar XTI
Figure 12. Company Vulnerabilities page under the Attack Surface Management Module of SOCRadar XTI

MITRE ATT&CK TTPs Used by Kimsuky

Technique

ID

Reconnaissance

Gather Victim Identity Information: Email Addresses

T1589.002

Gather Victim Identity Information: Employee Names

T1589.003

Gather Victim Org Information

T1591

Phishing for Information: Spearphishing Link

T1598.003

Search Open Websites/Domains: Social Media

T1593.001

Search Open Websites/Domains: Search Engines

T1593.002

Search Victim-Owned Websites

T1594

Resource Development

Acquire Infrastructure: Domains

T1583.001

Acquire Infrastructure: Server

T1583.004

Acquire Infrastructure: Web Services

T1583.006

Compromise Accounts: Email Accounts

T1586.002

Compromise Infrastructure: Domains

T1584.001

Develop Capabilities: Malware

T1587.001

Establish Accounts: Social Media Accounts

T1585.001

Establish Accounts: Email Accounts

T1585.002

Obtain Capabilities: Tool

T1588.002

Obtain Capabilities: Exploits

T1588.005

Stage Capabilities: Upload Malware

T1608.001

Initial Access

Exploit Public-Facing Application

T1190

Phishing: Spearphishing Attachment

T1566.001

Phishing: Spearphishing Link

T1566.002

Execution

Command and Scripting Interpreter: PowerShell

T1059.001

Command and Scripting Interpreter: Windows Command Shell

T1059.003

Command and Scripting Interpreter: Visual Basic

T1059.005

Command and Scripting Interpreter: Python

T1059.006

Command and Scripting Interpreter: JavaScript

T1059.007

User Execution: Malicious Link

T1204.001

User Execution: Malicious File

T1204.002

Persistence

Account Manipulation

T1098

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

T1547.001

Browser Extensions

T1176

Create Account: Local Account

T1136.001

Create or Modify System Process: Windows Service

T1543.003

External Remote Services

T1133

Scheduled Task/Job: Scheduled Task

T1053.005

Server Software Component: Web Shell

T1505.003

Software Discovery: Security Software Discovery

T1518.001

Privilege Escalation

Event Triggered Execution: Change Default File Association

T1546.001

Obfuscated Files or Information: Software Packing

T1027.002

Defense Evasion

Deobfuscate/Decode Files or Information

T1140

Hide Artifacts: Hidden Users

T1564.002

Hide Artifacts: Hidden Window

T1564.003

Impair Defenses: Disable or Modify Tools

T1562.001

Impair Defenses: Disable or Modify System Firewall

T1562.004

Indicator Removal: File Deletion

T1070.004

Indicator Removal: Timestomp

T1070.006

Masquerading

T1036

Masquerading: Masquerade Task or Service

T1036.004

Masquerading: Match Legitimate Name or Location

T1036.005

Modify Registry

T1112

Obfuscated Files or Information

T1027

Obfuscated Files or Information: Software Packing

T1027.002

Process Injection

T1055

Process Injection: Process Hollowing

T1055.012

Subvert Trust Controls: Code Signing

T1553.002

System Binary Proxy Execution: Mshta

T1218.005

System Binary Proxy Execution: Regsvr32

T1218.010

System Binary Proxy Execution: Rundll32

T1218.011

Use Alternate Authentication Material: Pass the Hash

T1550.002

Valid Accounts: Local Accounts

T1078.003

Credential Access

Adversary-in-the-Middle

T1557

Credentials from Password Stores: Credentials from Web Browsers

T1555.003

Multi-Factor Authentication Interception

T1111

OS Credential Dumping: LSASS Memory

T1003.001

Unsecured Credentials: Credentials In Files

T1552.001

Discovery

File and Directory Discovery

T1083

Network Sniffing

T1040

Process Discovery

T1057

Query Registry

T1012

System Information Discovery

T1082

System Network Configuration Discovery

T1016

System Service Discovery

T1007

Lateral Movement

Internal Spearphishing

T1534

Remote Services: Remote Desktop Protocol

T1021.001

Collection

Archive Collected Data: Archive via Utility

T1560.001

Archive Collected Data: Archive via Custom Method

T1560.003

Data from Local System

T1005

Data Staged: Local Data Staging

T1074.001

Email Collection: Remote Email Collection

T1114.002

Email Collection: Email Forwarding Rule

T1114.003

Input Capture: Keylogging

T1056.001

Command and Control

Application Layer Protocol: Web Protocols

T1071.001

Application Layer Protocol: File Transfer Protocols

T1071.002

Application Layer Protocol: Mail Protocols

T1071.003

Ingress Tool Transfer

T1105

Remote Access Software

T1219

Web Service: Bidirectional Communication

T1102.002

Exfiltration

Exfiltration Over C2 Channel

T1041

Exfiltration Over Web Service: Exfiltration to Cloud Storage

T1567.002