South Korean think tanks targeted in Kimsuky spy campaign

Share this article:

A cyber espionage group has targeted several South Korean think tanks, as well as a smaller number of entities in China, to deliver a data-stealing trojan.

According to Dmitry Tarakanov, a Kaspersky researcher who blogged about the threat on Wednesday, this particular campaign is standout due to the fact that the malware's command hub communicates with a Bulgarian email server, and the trojan's authors used Korean hieroglyphs to code the malware.

At least 11 organizations in South Korea were targeted, as well as two in China, Kaspersky found.

The trojan named “Kimsuky” has keylogging capabilities and collects other sensitive data like directory listing information and Word documents on machines. Due to IP addresses and email accounts used in the attacks, researchers believe the group has ties to North Korea.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Hackers grab email addresses of CurrentC pilot participants

Hackers grab email addresses of CurrentC pilot participants

Although the hack didn't breach the mobile payment app itself, consumer confidence may be shaken.

Operators disable firewall features to increase network performance, survey finds

Operators disable firewall features to increase network performance, ...

McAfee found that 60 percent of 504 surveyed IT professionals prioritize security as the primary driver of network design.

PCI publishes guidance on security awareness programs

PCI publishes guidance on security awareness programs

The guidance, developed by a PCI Special Interest Group, will help merchants educate staff on protecting cardholder data.