By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
Tech News

North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks

By Viral Trending Content 4 Min Read
Share
SHARE

Feb 13, 2025Ravie LakshmananUnited States

South Korea Cyberattacks

A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors.

The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet Chollima.

Cybersecurity

“Leveraging tailored phishing lures written in Korean and disguised as legitimate documents, the attackers successfully infiltrated targeted environments,” security researchers Den Iuzvyk and Tim Peck said in a report shared with The Hacker News, describing the activity as a “sophisticated and multi-stage operation.”

The decoy documents, sent via phishing emails as .HWP, .XLSX, and .PPTX files, are disguised as work logs, insurance documents and crypto-related files to trick recipients into opening them, thereby triggering the infection process.

The attack chain is notable for its heavy reliance on PowerShell scripts at various stages, including payload delivery, reconnaissance, and execution. It’s also characterized by the use of Dropbox for payload distribution and data exfiltration.

South Korea Cyberattacks

It all starts with a ZIP archive containing a single Windows shortcut (.LNK) file that masquerades as a legitimate document, which, when extracted and launched, triggers the execution of PowerShell code to retrieve and display a lure document hosted on Dropbox, while stealthily establishing persistence on the Windows host via a scheduled task named “ChromeUpdateTaskMachine.”

One such lure document, written in Korean, pertains to a safety work plan for forklift operations at a logistics facility, delving into the safe handling of heavy cargo and outlining ways to ensure compliance with workplace safety standards.

The PowerShell script is also designed to contact the same Dropbox location to fetch another PowerShell script that’s responsible for gathering and exfiltrating system information. Furthermore, it drops a third PowerShell script that’s ultimately responsible for executing an unknown .NET assembly.

“The use of OAuth token-based authentication for Dropbox API interactions allowed seamless exfiltration of reconnaissance data, such as system information and active processes, to predetermined folders,” the researchers said.

Cybersecurity

“This cloud-based infrastructure demonstrates an effective yet stealthy method of hosting and retrieving payloads, bypassing traditional IP or domain blocklists. Additionally, the infrastructure appeared dynamic and short-lived, as evidenced by the rapid removal of key links after initial stages of the attack, a tactic that not only complicates analysis but also suggests the attackers actively monitor their campaigns for operational security.”

Securonix said it was able to leverage the OAuth tokens to gain additional insights into the threat actor’s infrastructure, finding evidence that the campaign may have been underway since September last year.

“Despite the missing final stage, the analysis highlights the sophisticated techniques employed, including obfuscation, stealthy execution, and dynamic file processing, which demonstrate the attacker’s intent to evade detection and complicate incident response,” the researchers concluded.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Big data is transforming gaming experiences in Ireland

Commodore 64 Ultimate Review: An Astonishing Remake

Best New Tablet of the Year: Tech Advisor Awards 2025-26

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

Samsung Galaxy Z Fold 8 Wide Edition: Features and Specs

TAGGED: APT group, Cloud security, Cyber Security, Cybersecurity, Data Exfiltration, Digital Espionage, dropbox, Internet, Malware, phishing, powershell
Share This Article
Facebook Twitter Copy Link
Previous Article Vodafone announces new partnership with JAM Card and NOW Group, reinforcing Inclusion and Diversity commitments
Next Article Azerbaijan Strikes Gold as Stars Shine in New Weight Categories
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

How a governance failure led to the Unleash Protocol hack
Crypto
Shiba Inu Lead Dev Issues Must-Read Year-End Letter: What You Must Know
Crypto
Big data is transforming gaming experiences in Ireland
Tech News
Want to be a hit in the stock market? Here are 3 things super-successful investors do
Business
German paratrooper unit probed over alleged abuse, antisemitism and violence
World News
Asim Munir marries daughter to brother's son in Pakistan Army headquarters in Rawalpindi
Business
Today in History: December 30, Bill Cosby charged with sexual assault
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

How a governance failure led to the Unleash Protocol hack

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
How a governance failure led to the Unleash Protocol hack
December 30, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?