By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
Tech News

North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks

By Viral Trending Content 4 Min Read
Share
SHARE

Feb 13, 2025Ravie LakshmananUnited States

South Korea Cyberattacks

A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors.

The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet Chollima.

Cybersecurity

“Leveraging tailored phishing lures written in Korean and disguised as legitimate documents, the attackers successfully infiltrated targeted environments,” security researchers Den Iuzvyk and Tim Peck said in a report shared with The Hacker News, describing the activity as a “sophisticated and multi-stage operation.”

The decoy documents, sent via phishing emails as .HWP, .XLSX, and .PPTX files, are disguised as work logs, insurance documents and crypto-related files to trick recipients into opening them, thereby triggering the infection process.

The attack chain is notable for its heavy reliance on PowerShell scripts at various stages, including payload delivery, reconnaissance, and execution. It’s also characterized by the use of Dropbox for payload distribution and data exfiltration.

South Korea Cyberattacks

It all starts with a ZIP archive containing a single Windows shortcut (.LNK) file that masquerades as a legitimate document, which, when extracted and launched, triggers the execution of PowerShell code to retrieve and display a lure document hosted on Dropbox, while stealthily establishing persistence on the Windows host via a scheduled task named “ChromeUpdateTaskMachine.”

One such lure document, written in Korean, pertains to a safety work plan for forklift operations at a logistics facility, delving into the safe handling of heavy cargo and outlining ways to ensure compliance with workplace safety standards.

The PowerShell script is also designed to contact the same Dropbox location to fetch another PowerShell script that’s responsible for gathering and exfiltrating system information. Furthermore, it drops a third PowerShell script that’s ultimately responsible for executing an unknown .NET assembly.

“The use of OAuth token-based authentication for Dropbox API interactions allowed seamless exfiltration of reconnaissance data, such as system information and active processes, to predetermined folders,” the researchers said.

Cybersecurity

“This cloud-based infrastructure demonstrates an effective yet stealthy method of hosting and retrieving payloads, bypassing traditional IP or domain blocklists. Additionally, the infrastructure appeared dynamic and short-lived, as evidenced by the rapid removal of key links after initial stages of the attack, a tactic that not only complicates analysis but also suggests the attackers actively monitor their campaigns for operational security.”

Securonix said it was able to leverage the OAuth tokens to gain additional insights into the threat actor’s infrastructure, finding evidence that the campaign may have been underway since September last year.

“Despite the missing final stage, the analysis highlights the sophisticated techniques employed, including obfuscation, stealthy execution, and dynamic file processing, which demonstrate the attacker’s intent to evade detection and complicate incident response,” the researchers concluded.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Samsung Galaxy S26 Ultra Release Date Revealed

Dell Technologies Accelerates Enterprise AI with Powerful, Automated Solutions

Purple Promo Codes and Deals: Up to 30% Off

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

Optimism at 10-year high, as Europe’s technology sector hits $4trn mark

TAGGED: APT group, Cloud security, Cyber Security, Cybersecurity, Data Exfiltration, Digital Espionage, dropbox, Internet, Malware, phishing, powershell
Share This Article
Facebook Twitter Copy Link
Previous Article Vodafone announces new partnership with JAM Card and NOW Group, reinforcing Inclusion and Diversity commitments
Next Article Azerbaijan Strikes Gold as Stars Shine in New Weight Categories
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

“Grand Theft Auto 6 Will Make Billions” Say Protesters, Asking “Human Cost” to be Considered
Gaming News
Samsung Galaxy S26 Ultra Release Date Revealed
Tech News
Bitcoin ATMs appear in Nairobi malls as Kenya’s new crypto law faces early compliance test
Crypto
4 Takeaways From the Third CFP Rankings Release of 2025
Sports
Cristiano Ronaldo steals the spotlight at Trump’s White House dinner for saudi prince
World News
Kroger closing automated fulfillment centers as it tries to make delivery faster and cheaper
Business
Dell Technologies Accelerates Enterprise AI with Powerful, Automated Solutions
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

“Grand Theft Auto 6 Will Make Billions” Say Protesters, Asking “Human Cost” to be Considered

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
“Grand Theft Auto 6 Will Make Billions” Say Protesters, Asking “Human Cost” to be Considered
November 19, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?