Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

North Korean Hackers Employ Sophisticated Tactic to Infiltrate South Korea's Cyber Infrastructure



In a recent cyberattack, North Korean hackers have employed advanced techniques to breach South Korea's cybersecurity infrastructure. Leveraging PowerShell scripts and Dropbox, the attackers successfully infiltrated targeted environments, exfiltrating sensitive data through OAuth token-based authentication for Dropbox API interactions. This campaign marks another instance of North Korea's sophisticated tactics in targeting South Korea's business and government sectors.

  • North Korean hackers used PowerShell scripts in a targeted cyberattack campaign against South Korea.
  • The attackers leveraged Dropbox to distribute payloads and exfiltrate sensitive data.
  • The attack began with a phishing email containing a ZIP archive that triggered the execution of PowerShell code.
  • The attackers utilized OAuth token-based authentication for Dropbox API interactions, bypassing traditional IP or domain blocklists.
  • The campaign may have been underway since September last year, demonstrating the sophistication and operational security of North Korean hackers.



  • North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks
    In a recent development that highlights the evolving sophistication of nation-state threat actors, North Korean hackers have been linked to a targeted cyberattack campaign against South Korean businesses, governments, and cryptocurrency sectors. The attack, which has been dubbed DEEP#DRIVE by security researchers Securonix, is notable for its heavy reliance on PowerShell scripts at various stages, including payload delivery, reconnaissance, and execution. Furthermore, the attackers have leveraged Dropbox as a means of distributing payloads and exfiltrating sensitive data.

    The attack campaign began with a phishing email that contained a ZIP archive containing a single Windows shortcut (.LNK) file that masqueraded as a legitimate document. When extracted and launched, this file triggered the execution of PowerShell code, which in turn retrieved and displayed a lure document hosted on Dropbox. This document was designed to appear as if it pertained to safety work plans for forklift operations at logistics facilities, detailing safe handling procedures and compliance with workplace safety standards.

    The PowerShell script used in this stage was also designed to contact the Dropbox location again to fetch another PowerShell script responsible for gathering system information. Moreover, a third PowerShell script was dropped that executed an unknown .NET assembly, further solidifying the complexity of this operation.

    The researchers at Securonix observed that the attackers utilized OAuth token-based authentication for Dropbox API interactions, allowing seamless exfiltration of reconnaissance data such as system information and active processes to predetermined folders. This approach not only facilitated the transfer of sensitive information but also demonstrated an effective yet stealthy method of hosting and retrieving payloads, bypassing traditional IP or domain blocklists.

    Furthermore, the researchers discovered that this campaign may have been underway since September last year, with Securonix leveraging OAuth tokens to gain additional insights into the threat actor's infrastructure. These findings suggest not only the sophistication of the tactics employed by North Korean hackers but also their ability to maintain operational security and actively monitor campaigns for any weaknesses.

    The attackers' use of Dropbox for payload distribution and data exfiltration marked an innovative approach, as this cloud-based infrastructure enables hosts to bypass traditional IP or domain blocklists. The short-lived nature of these links further complicates analysis, suggesting that the attackers are proactively monitoring their campaigns for operational security.

    In conclusion, North Korean hackers have demonstrated advanced techniques in their latest cyberattack against South Korea, leveraging PowerShell scripts and Dropbox to infiltrate and exfiltrate sensitive data. This campaign highlights the ever-evolving tactics employed by nation-state threat actors and underscores the importance of staying vigilant against such sophisticated threats.



    Related Information:

  • https://thehackernews.com/2025/02/north-korean-apt43-uses-powershell-and.html

  • https://thehackernews.com/search/label/Digital Espionage


  • Published: Thu Feb 13 10:23:53 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us