Network Security, Threat Intelligence

PowerShell Exploited in New Kimsuky Intrusions

Computer keyboard, close-up button of the flag of North Korea.

North Korean advanced persistent threat operation Kimsuky has launched attacks facilitating self-inflicted compromise by luring targets into executing PowerShell as an administrator and subsequently running the given malicious code, reports Security Affairs.

After establishing trust with targets through the spoofing of a South Korean government official, Kimsuky — also known as APT43, ARCHIPELAGO, Black Banshee, Velvet Chollima, and Thallium — proceeded to distribute spear-phishing emails with a PDF document and a link redirecting to a website with PowerShell and code execution instructions, according to the Microsoft Threat Intelligence team. Execution of PowerShell as admin triggers remote desktop protocol deployment and web request delivery to a server before allowing device compromise and data theft.

"While we have only observed the use of this tactic in limited attacks since January 2025, this shift is indicative of a new approach to compromising their traditional espionage targets," said Microsoft Threat Intelligence in a post on X, formerly Twitter.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.