The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at South Korean cryptocurrency firms.
“Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads and exfiltration of files,” Kaspersky said in its APT trends report for Q1 2024.
The attacks, which occurred in August and November 2023, entailed the use of legitimate software exclusive to South Korea as an infection pathway, although the precise mechanism used to manipulate the program is currently unclear.
What’s known is that the software establishes a connection to the attacker’s server, leading to the retrieval of a malicious payload that kicks off the infection sequence.
It first-stage serves as an installer for additional malware and a means to establish persistence on the host. It also paves the way for a loader malware that eventually executes Durian.
Durian, for its part, is employed to introduce more malware, including AppleSeed, Kimsuky’s staple backdoor of choice, a custom proxy tool known as LazyLoad, as well as other legitimate tools like ngrok and Chrome Remote Desktop.
“Ultimately, the actor implanted the malware to pilfer browser-stored data including cookies and login credentials,” Kaspersky said.
A notable aspect of the attack is the use of LazyLoad, which has been previously put to use by Andariel, a sub-cluster within the Lazarus Group, raising the possibility of a potential collaboration or a tactical overlap between the two threat actors.
The Kimsuky group is known to be active since at least 2012, with its malicious cyber activities also APT43, Black Banshee, Emerald Sleet (formerly Thallium), Springtail, TA427, and Velvet Chollima.
It is assessed to be a subordinate element to the 63rd Research Center, an element within the Reconnaissance General Bureau (RGB), the hermit kingdom’s premier military intelligence organization.
“Kimsuky actors’ primary mission is to provide stolen data and valuable geopolitical insight to the North Korean regime by compromising policy analysts and other experts,” the U.S. Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) said in an alert earlier this month.
“Successful compromises further enable Kimsuky actors to craft more credible and effective spear-phishing emails, which can then be leveraged against more sensitive, higher-value targets.”
The nation-state adversary has also been linked to campaigns that deliver a C#-based remote access trojan and information stealer called TutorialRAT that utilizes Dropbox as a “base for their attacks to evade threat monitoring,” Broadcom-owned Symantec said.
“This campaign appears to be an extension of APT43’s BabyShark threat campaign and employs typical spear-phishing techniques, including the use of shortcut (LNK) files,” it added.
The development comes as the AhnLab Security Intelligence Center (ASEC) detailed a campaign orchestrated by another North Korean state-sponsored hacking group called ScarCruft that’s targeting South Korean users with Windows shortcut (LNK) files that culminate in the deployment of RokRAT.
The adversarial collective, also known as APT37, InkySquid, RedEyes, Ricochet Chollima, and Ruby Sleet, is said to be aligned with North Korea’s Ministry of State Security (MSS) and tasked with covert intelligence gathering in support of the nation’s strategic military, political, and economic interests.
“The recently confirmed shortcut files (*.LNK) are found to be targeting South Korean users, particularly those related to North Korea,” ASEC said.