Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Phishing Campaign Exploits GitHub as C2 Tool

North Korean Phishing Campaign Exploits GitHub as C2 Tool

Posted on April 3, 2026 By CWS

A recent cyber campaign attributed to North Korean state-sponsored groups is leveraging Windows LNK files to execute targeted phishing attacks on organizations in South Korea. This campaign notably utilizes GitHub, a trusted internet platform, as a covert Command and Control (C2) channel, enhancing its stealth and effectiveness.

GitHub as an Unlikely C2 Channel

Using GitHub for malicious purposes is particularly concerning due to its widespread trust and acceptance in corporate environments. The campaign’s traffic seamlessly blends with legitimate web activities, bypassing many security measures. This operation, active since at least 2024, has evolved in sophistication, with initial versions of LNK files being less obfuscated and linked to XenoRAT malware distribution.

Recent developments in the campaign include embedding decoding functions within the LNK file arguments and concealing encoded payloads within the files themselves. Attackers employ decoy PDF documents to give users the impression of legitimate file activity while executing malicious scripts in the background.

Targeted Attacks on South Korean Organizations

FortiGuard Labs, under analyst Cara Lin, has identified this campaign, noting that the decoy PDF titles indicate a focus on specific South Korean companies, hinting at a broader surveillance effort. The metadata patterns, such as the “Hangul Document” naming convention, align with techniques used by North Korean groups like Kimsuky, APT37, and Lazarus.

This campaign is classified as high severity because the compromised data can facilitate subsequent attacks. The attackers craft documents around pertinent topics in Korean business, such as financial proposals and strategic partnerships, to enhance their credibility.

Long-Term Surveillance and Data Collection

The operation’s objective appears to be sustained surveillance and intelligence gathering. By using scheduled tasks that activate every 30 minutes and private GitHub repositories for storing stolen data, the attackers maintain an ongoing presence in compromised systems unnoticed.

The attack initiates with the opening of what seems like a regular PDF document, which is actually an LNK file triggering a PowerShell script. This script, upon confirming the absence of virtual machines and forensic tools, sets up a persistent scheduled task and collects system information for upload to the attacker’s GitHub repository.

Mitigation and Security Recommendations

Organizations and users should be wary of unsolicited LNK and PDF files, regardless of their appearance. Monitoring for unusual PowerShell or VBScript activities and investigating unexpected GitHub API endpoint connections are crucial steps in mitigating these threats.

Stay informed by following us on Google News, LinkedIn, and X, and consider setting CSN as a preferred source in Google for timely updates.

Cyber Security News Tags:APT37, C2 channel, cyber threat, Cybersecurity, FortiGuard Labs, GitHub, Kimsuky, Lazarus, LNK files, Malware, North Korea, Phishing, PowerShell, VBScript, XenoRAT

Post navigation

Previous Post: Adobe Data Breach: 13 Million Records Allegedly Leaked
Next Post: Top 20 APM Tools to Enhance Application Performance

Related Posts

Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine Cyber Security News
Malvertising Campaign Exploits Tax Season with EDR Attacks Malvertising Campaign Exploits Tax Season with EDR Attacks Cyber Security News
Qilin Led Ransomware Attack Claimed to Compromised 104 Organizations in August Qilin Led Ransomware Attack Claimed to Compromised 104 Organizations in August Cyber Security News
NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation Cyber Security News
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands Cyber Security News
Critical Zero-Day Flaws in PDF Software Risk Data Exposure Critical Zero-Day Flaws in PDF Software Risk Data Exposure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • T-Mobile Clarifies Impact of Recent Data Breach
  • Drift Faces $285M Loss in Social Engineering Heist
  • Microsoft Automates Windows 11 25H2 Upgrade Rollout
  • New SparkCat Malware Targets Crypto Wallets on Mobile Apps
  • Top Linux VPNs for 2026: Ensure Privacy and Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • T-Mobile Clarifies Impact of Recent Data Breach
  • Drift Faces $285M Loss in Social Engineering Heist
  • Microsoft Automates Windows 11 25H2 Upgrade Rollout
  • New SparkCat Malware Targets Crypto Wallets on Mobile Apps
  • Top Linux VPNs for 2026: Ensure Privacy and Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark