Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Exploit GitHub in South Korea Cyber Attacks

North Korean Hackers Exploit GitHub in South Korea Cyber Attacks

Posted on April 6, 2026 By CWS

Recent investigations have revealed that cyber attackers linked to North Korea are leveraging GitHub as a command-and-control (C2) platform in a series of sophisticated cyber attacks targeting South Korean entities. The strategy, uncovered by Fortinet FortiGuard Labs, involves a multi-step assault initiated through obfuscated Windows shortcut (LNK) files, which are thought to be distributed via phishing emails.

Innovative Use of GitHub in Cyber Attacks

The attack begins when victims unknowingly download malicious payloads that include a decoy PDF document and a hidden PowerShell script. As the PDF distracts the user, the script executes silently, scanning for virtual machines or forensic tools. If such tools are detected, the script halts immediately to prevent analysis.

When uninterrupted, the PowerShell script extracts a Visual Basic Script (VBScript) and uses a scheduled task to ensure persistence by launching the malicious PowerShell payload every 30 minutes. This tactic helps maintain a covert presence on the infected system, allowing the script to run automatically after reboots.

Exfiltration and Command Manipulation

The PowerShell script further profiles the compromised system, saving the results to a log file and exfiltrating it to a GitHub repository managed by the account ‘motoralis’. Numerous GitHub accounts, such as ‘God0808RAMA’ and ‘brandonleeodd93-blip’, have been identified as part of this campaign, facilitating the attackers’ ability to fetch additional instructions or modules.

The attackers exploit GitHub’s trusted platform to blend in, making it difficult for security systems to detect malicious activity. This method allows for sustained and undetected control over infected machines.

Shifting Techniques and Broader Implications

Earlier versions of this campaign relied on LNK files to deploy malware such as Xeno RAT, with the use of GitHub C2 for distribution previously documented by ENKI and Trellix. The Kimsuky group, believed to be state-sponsored by North Korea, is linked to these operations.

Security expert Cara Lin notes that the attackers utilize native Windows tools to minimize detection, avoiding complex custom malware. This approach broadens the range of potential targets while maintaining a low profile.

In a related development, AhnLab has documented a similar LNK-based infection chain from Kimsuky, ultimately leading to the deployment of a Python-based backdoor. This method involves a complex chain of payloads, including decoy documents and batch scripts, to establish persistence and communication with a C2 server.

The findings coincide with ScarCruft’s transition from LNK-based attacks to using Hangul Word Processor (HWP) OLE-based droppers for delivering RokRAT, a remote access trojan linked to North Korean cyber operations. This shift highlights the evolving tactics of North Korean hackers as they continue to refine their methods to evade detection and achieve their objectives.

The Hacker News Tags:cyber attacks, Cybersecurity, DPRK, GitHub, GitHub C2, Hackers, Kimsuky, LNK files, Malware, North Korea, Phishing, PowerShell, RATs, South Korea, threat intelligence

Post navigation

Previous Post: Critical Fortinet Vulnerability Exploited, CISA Issues Warning
Next Post: Malicious PyPI AI Tool Steals Data via Trojanized Proxy

Related Posts

Trivy Security Breach: 75 Tags Compromised in GitHub Actions Trivy Security Breach: 75 Tags Compromised in GitHub Actions The Hacker News
Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features The Hacker News
Meta Adds Passkey Login Support to Facebook for Android and iOS Users Meta Adds Passkey Login Support to Facebook for Android and iOS Users The Hacker News
Enhancing Mobile Security with Samsung Knox Enhancing Mobile Security with Samsung Knox The Hacker News
MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants The Hacker News
Ubuntu Security Flaw CVE-2026-3888 Enables Root Access Ubuntu Security Flaw CVE-2026-3888 Enables Root Access The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ILSpy Site Hacked, Spreads Malware to Developers
  • Iran-Linked Cyber Attacks Target Israeli Microsoft 365
  • North Korean IT Worker Exposed by Unusual Interview Tactic
  • Malicious PyPI AI Tool Steals Data via Trojanized Proxy
  • North Korean Hackers Exploit GitHub in South Korea Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ILSpy Site Hacked, Spreads Malware to Developers
  • Iran-Linked Cyber Attacks Target Israeli Microsoft 365
  • North Korean IT Worker Exposed by Unusual Interview Tactic
  • Malicious PyPI AI Tool Steals Data via Trojanized Proxy
  • North Korean Hackers Exploit GitHub in South Korea Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark