Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Kimsuky Hackers Exploit LNK, JSE Lures Against Key Sectors

Kimsuky Hackers Exploit LNK, JSE Lures Against Key Sectors

Posted on May 19, 2026 By CWS

In a series of sophisticated cyber attacks, the Kimsuky hacker group, linked to North Korea, has targeted several sectors including corporate recruitment, cryptocurrency, and defense. The group orchestrated four separate spear-phishing campaigns during the first half of 2025, aiming at corporate recruiters, crypto enthusiasts, defense industry officials, and academic administrators.

Targeting Techniques and Victims

The Kimsuky group’s approach involved personalized deception tactics to infiltrate targets. Corporate recruiters were sent fake resumes and business cards, while cryptocurrency users were tempted with themes related to Solana meme coins. Defense officials received documents associated with the K-ICTC International Scientific Combat Management Competition.

Graduate school administrators were not spared, receiving what appeared to be legitimate enrollment documents. Despite the varied disguises, the ultimate aim was to gain unauthorized access without detection.

Advanced Attack Strategies

According to analysts at LogPresso, the campaigns followed a consistent methodology: presenting a decoy document, deploying a malicious payload, and securing a remote control channel. The attackers showcased their sophistication by utilizing reputable platforms such as GitHub raw APIs and Microsoft CDN to mask their activities.

This strategy allowed their traffic to blend seamlessly with legitimate operations, complicating detection for security tools reliant on reputation-based mechanisms. Personalized victim identification through unique IDs and IP addresses was a notable tactic within these campaigns.

Defense Evasion and Persistence

Kimsuky attackers demonstrated aggressive measures to bypass security defenses quickly. Within minutes of engagement, malware disabled Windows User Account Control, registered exceptions in Windows Defender, and embedded persistent elements in the Task Scheduler.

LogPresso highlighted the limitations of relying on individual Indicators of Compromise (IoCs), advocating instead for behavior-based detection strategies to counteract these adaptive tactics.

LNK and JSE File Exploitation

Three campaigns predominantly used LNK files disguised as PDFs, tricking users into opening them. This initiated a sequence where a decoy document was shown, and a hidden payload was executed, installing persistence mechanisms and PowerShell scripts.

The fourth campaign employed a JSE file with a double extension, a tactic exploiting Windows’ default settings to appear as a harmless document. This variant used a VSCode tunnel for sustained remote access, leveraging Microsoft’s signed binaries to remain undetected.

Recommendations for Defense

Kimsuky’s reliance on legitimate services for command-and-control operations underscores the need for vigilant defense strategies. Organizations are advised to monitor for unusual LNK or JSE file activity, unexpected Task Scheduler entries, and unauthorized UAC modifications.

Behavioral monitoring, rather than static IoC-based defenses, is recommended to effectively counter the evolving threat posed by the Kimsuky group.

For continued updates on cybersecurity threats, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source for the latest insights.

Cyber Security News Tags:crypto security, cyber attack, cyber espionage, Cybersecurity, defense hacking, GitHub, graduate school, JSE scripts, Kimsuky, LNK files, LogPresso, Malware, Microsoft CDN, North Korea, spear-phishing

Post navigation

Previous Post: Trapdoor Android Fraud Scheme Hijacks 659 Million Daily Requests

Related Posts

2025 Insider Risk Report Finds Most Organizations Struggle to Detect and Predict Insider Risks 2025 Insider Risk Report Finds Most Organizations Struggle to Detect and Predict Insider Risks Cyber Security News
Credential Theft Drives Brute-Force Attacks on SSO Systems Credential Theft Drives Brute-Force Attacks on SSO Systems Cyber Security News
GitHub AI Agents Exposed to New Vulnerability GitHub AI Agents Exposed to New Vulnerability Cyber Security News
GhostClaw Malware Targets macOS Users with AI Tools GhostClaw Malware Targets macOS Users with AI Tools Cyber Security News
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Cyber Security News
Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kimsuky Hackers Exploit LNK, JSE Lures Against Key Sectors
  • Trapdoor Android Fraud Scheme Hijacks 659 Million Daily Requests
  • JavaScript and PowerShell Malware Targets Cryptocurrency
  • Microsoft Halts Malware-Signing Operation by Fox Tempest
  • Critical Fixes Issued for PostgreSQL Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kimsuky Hackers Exploit LNK, JSE Lures Against Key Sectors
  • Trapdoor Android Fraud Scheme Hijacks 659 Million Daily Requests
  • JavaScript and PowerShell Malware Targets Cryptocurrency
  • Microsoft Halts Malware-Signing Operation by Fox Tempest
  • Critical Fixes Issued for PostgreSQL Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark