By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
Tech News

North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks

By Viral Trending Content 4 Min Read
Share
SHARE

Feb 13, 2025Ravie LakshmananUnited States

South Korea Cyberattacks

A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors.

The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet Chollima.

Cybersecurity

“Leveraging tailored phishing lures written in Korean and disguised as legitimate documents, the attackers successfully infiltrated targeted environments,” security researchers Den Iuzvyk and Tim Peck said in a report shared with The Hacker News, describing the activity as a “sophisticated and multi-stage operation.”

The decoy documents, sent via phishing emails as .HWP, .XLSX, and .PPTX files, are disguised as work logs, insurance documents and crypto-related files to trick recipients into opening them, thereby triggering the infection process.

The attack chain is notable for its heavy reliance on PowerShell scripts at various stages, including payload delivery, reconnaissance, and execution. It’s also characterized by the use of Dropbox for payload distribution and data exfiltration.

South Korea Cyberattacks

It all starts with a ZIP archive containing a single Windows shortcut (.LNK) file that masquerades as a legitimate document, which, when extracted and launched, triggers the execution of PowerShell code to retrieve and display a lure document hosted on Dropbox, while stealthily establishing persistence on the Windows host via a scheduled task named “ChromeUpdateTaskMachine.”

One such lure document, written in Korean, pertains to a safety work plan for forklift operations at a logistics facility, delving into the safe handling of heavy cargo and outlining ways to ensure compliance with workplace safety standards.

The PowerShell script is also designed to contact the same Dropbox location to fetch another PowerShell script that’s responsible for gathering and exfiltrating system information. Furthermore, it drops a third PowerShell script that’s ultimately responsible for executing an unknown .NET assembly.

“The use of OAuth token-based authentication for Dropbox API interactions allowed seamless exfiltration of reconnaissance data, such as system information and active processes, to predetermined folders,” the researchers said.

Cybersecurity

“This cloud-based infrastructure demonstrates an effective yet stealthy method of hosting and retrieving payloads, bypassing traditional IP or domain blocklists. Additionally, the infrastructure appeared dynamic and short-lived, as evidenced by the rapid removal of key links after initial stages of the attack, a tactic that not only complicates analysis but also suggests the attackers actively monitor their campaigns for operational security.”

Securonix said it was able to leverage the OAuth tokens to gain additional insights into the threat actor’s infrastructure, finding evidence that the campaign may have been underway since September last year.

“Despite the missing final stage, the analysis highlights the sophisticated techniques employed, including obfuscation, stealthy execution, and dynamic file processing, which demonstrate the attacker’s intent to evade detection and complicate incident response,” the researchers concluded.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Anthropic accidentally leaks Claude Code source in npm slip

Apple Glass Early Look: 2026 Release Date & Leaked Features

Oracle cutting thousands of jobs in round of layoffs – CNBC

Aiper IrriSense 2 Smart Irrigation System Review: Clever Yet Uneven

France buys supercomputer maker Bull in tech sovereignty push

TAGGED: APT group, Cloud security, Cyber Security, Cybersecurity, Data Exfiltration, Digital Espionage, dropbox, Internet, Malware, phishing, powershell
Share This Article
Facebook Twitter Copy Link
Previous Article Vodafone announces new partnership with JAM Card and NOW Group, reinforcing Inclusion and Diversity commitments
Next Article Azerbaijan Strikes Gold as Stars Shine in New Weight Categories
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

He wants to join: Spurs burst into race to sign De Zerbi's new Caicedo
Sports
How Corporate Natalie turned a $500 brand deal into a creator empire—and her own agency
Business
Anthropic launches PAC amid tensions with Trump administration over AI policy
Crypto
Artemis II spacecrew prepare for historic moon flyby
World News
Crypto Hacks Dropped Sharply In Early 2026, But Experts Say The Threat Isn’t Going Away
Crypto
£5,000 invested in Nvidia stock 6 months ago is now worth…
Business
Boots on ground may not be needed: Secretary of State Marco Rubio on Iran war
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

He wants to join: Spurs burst into race to sign De Zerbi's new Caicedo

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
He wants to join: Spurs burst into race to sign De Zerbi's new Caicedo
April 5, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?