Skip to content

North Korean Kimsuky Hackers Utilized GitHub to Launch XenoRAT Malware against Foreign Embassies

North Korean hackers known as Kimsuky employed GitHub C2 and XenoRAT in 19 targeted phishing attacks on embassies in Seoul, successfully obtaining confidential diplomatic information.

Foreign North Korean hackers known as Kimsuky exploited GitHub to launch cyber-attacks against...
Foreign North Korean hackers known as Kimsuky exploited GitHub to launch cyber-attacks against foreign embassies utilizing XenoRAT malware.

North Korean Kimsuky Hackers Utilized GitHub to Launch XenoRAT Malware against Foreign Embassies

A sophisticated North Korean espionage campaign, attributed to the DPRK-linked hacking group Kimsuky (APT43), has been identified targeting diplomatic missions in South Korea from March to July 2025. The operation, which presents significant challenges for diplomatic security worldwide, employs advanced tactics and persistence mechanisms to gain remote access and control over compromised systems for intelligence gathering.

Evolution, Tactics, and Persistence Mechanisms

The campaign's key elements include:

  • Infection and Delivery: The attackers send spear-phishing emails with convincing lures, often in multiple languages, that include meeting invitations, official letters, and event notifications relevant to diplomatic activities and alliances.
  • Malware and Payload: The malicious payload is a variant of XenoRAT, an open-source remote access trojan (RAT). It is delivered via password-protected ZIP files containing obfuscated scripts and malicious Windows shortcut (.LNK) files disguised as PDFs.
  • Command-and-Control (C2) Infrastructure: Instead of traditional C2 servers, the attackers abuse GitHub as a covert command-and-control channel. They download payloads and exfiltrate data via HTTPS, allowing traffic to blend with legitimate developer platform activity.
  • Persistence Mechanisms: XenoRAT establishes persistence on infected systems through scheduled tasks, collecting extensive system reconnaissance data such as OS versions, IP addresses, running processes, keystrokes, screenshots, and file contents.
  • Campaign Phases and Geographic Focus: The campaign unfolded in phases with shifting lures tied to diplomatic themes. The focus was on foreign embassies located in South Korea, touching multiple Western and Central European missions as well as U.S.-aligned targets.
  • Attribution and Complexity: While the infrastructure and malware characteristics strongly connect the campaign to North Korea's Kimsuky group, researchers observed certain operational patterns that align with Chinese operatives, suggesting potential Chinese involvement or sponsorship.

Deployment Process and Investigation

The XenoRAT deployment process uses advanced evasion techniques to bypass traditional security controls. Multifunctional platforms were created on GitHub accounts for hosting decoy documents, managing PowerShell scripts, and collecting exfiltrated intelligence data. The investigation revealed that the threat actors created at least two GitHub accounts, "blairity" and "landjhon."

The malware employs a sophisticated GZIP header manipulation technique, consistently observed in North Korean operations. The PowerShell script overwrites the first seven bytes of downloaded payloads with the proper GZIP magic sequence before decompression. Data exfiltration occurs through GitHub API uploads using hardcoded personal access tokens, with stolen information formatted in timestamped filenames and base64-encoded before transmission.

This campaign underscores the increasing sophistication of North Korean cyber operations and the need for heightened vigilance in the face of advanced, multi-layered attacks leveraging social engineering, cloud services abuse, and stealthy RAT operations with strong persistence. The use of GitHub as a C2 channel and cloud storage for payload hosting represents an evolution in North Korean tactics to evade detection and maintain long-term access to sensitive diplomatic networks.

Read also:

Latest