Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Kimsuky Uses LNK Files to Deploy Python Backdoor

Kimsuky Uses LNK Files to Deploy Python Backdoor

Posted on April 3, 2026 By CWS

A North Korean hacking group known as Kimsuky has been identified in a new cyber campaign leveraging malicious Windows shortcut files, or LNK files, to surreptitiously install a Python-based backdoor on targeted computers.

This complex attack unfolds in multiple stages, making it more challenging for security systems to detect the threat before the final payload is activated on the victim’s machine.

Evolution of Kimsuky’s Attack Strategy

Historically, Kimsuky has focused on government bodies, research facilities, and individuals primarily in South Korea and elsewhere. The group is notorious for evolving its methods, with the latest campaign showcasing a significant shift in malware delivery tactics.

The overarching objective remains to deploy a Python backdoor on compromised devices. However, Kimsuky has incorporated additional steps into the attack progression, enhancing obfuscation and control over the infection process.

New Structural Changes in Malware Execution

Researchers from ASEC have observed these recent modifications, indicating a redesigned execution flow for Kimsuky’s LNK files. Previously, the process transitioned from an LNK file directly via PowerShell to a BAT file. The revised approach now involves intermediary stages passing through an XML file, a VBS file, a PS1 script, and finally to a BAT file before reaching its final destination.

This complex chain introduces extra layers between stages, allowing the malware to evade detection effectively. The LNK files are disguised as common documents with innocuous titles like “Resume (Sungmin Park).hwp.lnk,” enticing users to open them without suspicion.

Implications of the Multi-Stage Infection Mechanism

Once executed, the LNK file activates a concealed PowerShell script that sets up a hidden directory at C:windirr, obscured by system and hidden file attributes. This directory is where the attack unfolds, dropping an XML task scheduler file, a VBS script, and a PowerShell script.

The XML file registers a task scheduler with a Google-themed name to execute persistently every 17 minutes. The VBS script then triggers the PowerShell script to gather critical system data and send it to the attackers via Dropbox, cleverly masking malicious activity within typical network traffic.

Subsequently, the PowerShell script downloads a BAT file, which fetches ZIP file fragments from remote servers, merges them, and extracts the final payload: a Python backdoor named beauty.py. This backdoor connects to a command-and-control server, awaiting further instructions.

Preventive Measures and Recommendations

To mitigate such threats, users should be cautious of LNK files received through email or messaging applications, particularly those mimicking ordinary documents. Organizations are advised to continuously monitor Windows Task Scheduler for unusual entries and ensure endpoint security measures are up-to-date.

Blocking unauthorized outbound connections to unfamiliar services can also help prevent successful intrusions. Staying informed about evolving threats and adapting security protocols accordingly remains crucial in defending against sophisticated cyber attacks like those orchestrated by Kimsuky.

Cyber Security News Tags:backdoor installation, cyber attack, cyber threat, Cybersecurity, IT security, Kimsuky, Kimsuky tactics, LNK files, malicious files, Malware, multi-stage attack, North Korean hackers, Python backdoor, security tools

Post navigation

Previous Post: React2Shell Exploitation: Large-Scale Attack Exposes Credentials
Next Post: North Korean Hackers Steal $285M from DeFi Platform

Related Posts

HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access Cyber Security News
New Report Warns of Threat Actors Actively Adopting AI Platforms to Attack Manufacturing Companies New Report Warns of Threat Actors Actively Adopting AI Platforms to Attack Manufacturing Companies Cyber Security News
Building a Cyber-Resilient Organization in 2025 Building a Cyber-Resilient Organization in 2025 Cyber Security News
Critical SOQL Injection 0-Day Vulnerability in Salesforce Affects Millions Worldwide Critical SOQL Injection 0-Day Vulnerability in Salesforce Affects Millions Worldwide Cyber Security News
Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host Cyber Security News
New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users
  • China-Linked TA416 Intensifies Cyber Attacks on Europe
  • Urgent Security Alert: Thousands of F5 BIG-IP Devices at Risk
  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users
  • China-Linked TA416 Intensifies Cyber Attacks on Europe
  • Urgent Security Alert: Thousands of F5 BIG-IP Devices at Risk
  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark