PULSE NAME
Inside the Kimsuky Leak: How the 'Kim' Dump Exposed North Korea's Credential Theft Playbook
WHITE Kimsuky (APT43) AlienVault 2025-09-08 Modified: 2025-10-08
4
IOCs
LOW VOLUME
A data breach attributed to a North Korean-affiliated actor known as "Kim" has provided new insights into Kimsuky (APT43) tactics and infrastructure. The actor's operations focus on credential-based intrusions targeting South Korean and Taiwanese networks, utilizing Chinese-language tools and infrastructure. The leaked data includes bash histories, phishing domains, OCR workflows, compiled stagers, and rootkit evidence, revealing a hybrid operation between DPRK attribution and Chinese resource utilization. The actor demonstrated sophisticated credential harvesting techniques, including targeting South Korea's Government Public Key Infrastructure (GPKI) and reconnaissance of Taiwanese government and academic institutions. The leak exposes the evolution of DPRK cyber capabilities and highlights the complex attribution challenges in modern nation-state cyber operations.
MITRE ATT&CK & Malware Families
MALWARE FAMILIES
vmmisc.ko
Indicators of Compromise (4)
All domain
TYPEINDICATORDESCRIPTIONCREATED
domain koala-app.com 2025-09-08
domain nid-security.com 2025-09-08
domain webcloud-notice.com 2025-09-08
domain wuzak.com 2025-09-08