By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
Tech News

North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack

By Viral Trending Content 6 Min Read
Share
SHARE

Feb 12, 2025Ravie LakshmananIT Security / Cybercrime

The North Korea-linked threat actor known as Kimsuky has been observed using a new tactic that involves deceiving targets into running PowerShell as an administrator and then instructing them to paste and run malicious code provided by them.

“To execute this tactic, the threat actor masquerades as a South Korean government official and over time builds rapport with a target before sending a spear-phishing email with an [sic] PDF attachment,” the Microsoft Threat Intelligence team said in a series of posts shared on X.

To read the purported PDF document, victims are persuaded to click a URL containing a list of steps to register their Windows system. The registration link urges them to launch PowerShell as an administrator and copy/paste the displayed code snippet into terminal, and execute it.

Cybersecurity

Should the victim follow through, the malicious code downloads and installs a browser-based remote desktop tool, along with a certificate file with a hardcoded PIN from a remote server.

“The code then sends a web request to a remote server to register the victim device using the downloaded certificate and PIN. This allows the threat actor to access the device and carry out data exfiltration,” Microsoft said.

The tech giant said it observed the use of this approach in limited attacks since January 2025, describing it as a departure from the threat actor’s usual tradecraft.

It’s worth noting that the Kimsuky is not the only North Korean hacking crew to adopt the compromise strategy. In December 2024, it was revealed that threat actors linked to the Contagious Interview campaign are tricking users into copying and executing a malicious command on their Apple macOS systems via the Terminal app so as to address a supposed problem with accessing the camera and microphone through the web browser.

Such attacks, along with those that have embraced the so-called ClickFix method, have taken off in a big way in recent months, in part driven by the fact that they rely on the targets to infect their own machines, thereby bypassing security protections.

Arizona woman pleads guilty to running laptop farm for North Korean IT workers

The development comes as the U.S. Department of Justice (DoJ) said a 48-year-old woman from the state of Arizona pleaded guilty for her role in the fraudulent IT worker scheme that allowed North Korean threat actors to obtain remote jobs in more than 300 U.S. companies by posing as U.S. citizens and residents.

The activity generated over $17.1 million in illicit revenue for Christina Marie Chapman and for North Korea in violation of international sanctions between October 2020 and October 2023, the department said.

“Chapman, an American citizen, conspired with overseas IT workers from October 2020 to October 2023 to steal the identities of U.S. nationals and used those identities to apply for remote IT jobs and, in furtherance of the scheme, transmitted false documents to the Department of Homeland Security,” the DoJ said.

“Chapman and her coconspirators obtained jobs at hundreds of U.S. companies, including Fortune 500 corporations, often through temporary staffing companies or other contracting organizations.”

Cybersecurity

The defendant, who was arrested in May 2024, has also been accused of running a laptop farm by hosting multiple laptops at her residence to give the impression that the North Korean workers were working from within the country, when, in reality, they were based in China and Russia and remotely connected to the companies’ internal systems.

“As a result of the conduct of Chapman and her conspirators, more than 300 U.S. companies were impacted, more than 70 identities of U.S. person were compromised, on more than 100 occasions false information was conveyed to DHS, and more than 70 U.S. individuals had false tax liabilities created in their name,” the DoJ added.

The increased law enforcement scrutiny has led to an escalation of the IT worker scheme, with reports emerging of data exfiltration and extortion.

“After being discovered on company networks, North Korean IT workers have extorted victims by holding stolen proprietary data and code hostage until the companies meet ransom demands,” the U.S. Federal Bureau of Investigation (FBI) said in an advisory last month. “In some instances, North Korean IT workers have publicly released victim companies’ proprietary code.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

Samsung Galaxy Z Fold 8 Wide Edition: Features and Specs

Social Voice social media intelligence Spark Venture Funding

MediSnap helping vulnerable patients, Declan Watters

The Worst Hacks of 2025

TAGGED: Cyber Security, Cybercrime, Cybersecurity, FBI, hacking, Internet, IT security, North Korea, phishing, Remote Work, social engineering, Threat Intelligence
Share This Article
Facebook Twitter Copy Link
Previous Article Monster Hunter Wilds – Weapon Hitstops Will Be “Closer to What People Are Looking Forward To”
Next Article ‘We’ll bring hygge to Hollywood’: Danes petition to buy California as Trump pursues Greenland
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Out of touch or in your hands? Know more, ask more with Euronews’ EU.XL coverage
World News
Where Is Brigitte Bardot’s Son Nicolas-Jacques Charrier Now? His Life Today
Celebrity
Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor
Tech News
Why Israel's recognition of Somaliland as an independent state is controversial
World News
Financials, consumption and manufacturing to lead next market upcycle: Vikas Khemani
Business
Samsung Galaxy Z Fold 8 Wide Edition: Features and Specs
Tech News
Europe’s rail network renaissance continues with five new trains launching in 2026
Travel

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Out of touch or in your hands? Know more, ask more with Euronews’ EU.XL coverage

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Out of touch or in your hands? Know more, ask more with Euronews’ EU.XL coverage
December 30, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?