Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Kimsuky Uses LNK Files to Deploy Python Backdoor

Kimsuky Uses LNK Files to Deploy Python Backdoor

Posted on April 3, 2026 By CWS

A North Korean hacking group known as Kimsuky has been identified in a new cyber campaign leveraging malicious Windows shortcut files, or LNK files, to surreptitiously install a Python-based backdoor on targeted computers.

This complex attack unfolds in multiple stages, making it more challenging for security systems to detect the threat before the final payload is activated on the victim’s machine.

Evolution of Kimsuky’s Attack Strategy

Historically, Kimsuky has focused on government bodies, research facilities, and individuals primarily in South Korea and elsewhere. The group is notorious for evolving its methods, with the latest campaign showcasing a significant shift in malware delivery tactics.

The overarching objective remains to deploy a Python backdoor on compromised devices. However, Kimsuky has incorporated additional steps into the attack progression, enhancing obfuscation and control over the infection process.

New Structural Changes in Malware Execution

Researchers from ASEC have observed these recent modifications, indicating a redesigned execution flow for Kimsuky’s LNK files. Previously, the process transitioned from an LNK file directly via PowerShell to a BAT file. The revised approach now involves intermediary stages passing through an XML file, a VBS file, a PS1 script, and finally to a BAT file before reaching its final destination.

This complex chain introduces extra layers between stages, allowing the malware to evade detection effectively. The LNK files are disguised as common documents with innocuous titles like “Resume (Sungmin Park).hwp.lnk,” enticing users to open them without suspicion.

Implications of the Multi-Stage Infection Mechanism

Once executed, the LNK file activates a concealed PowerShell script that sets up a hidden directory at C:windirr, obscured by system and hidden file attributes. This directory is where the attack unfolds, dropping an XML task scheduler file, a VBS script, and a PowerShell script.

The XML file registers a task scheduler with a Google-themed name to execute persistently every 17 minutes. The VBS script then triggers the PowerShell script to gather critical system data and send it to the attackers via Dropbox, cleverly masking malicious activity within typical network traffic.

Subsequently, the PowerShell script downloads a BAT file, which fetches ZIP file fragments from remote servers, merges them, and extracts the final payload: a Python backdoor named beauty.py. This backdoor connects to a command-and-control server, awaiting further instructions.

Preventive Measures and Recommendations

To mitigate such threats, users should be cautious of LNK files received through email or messaging applications, particularly those mimicking ordinary documents. Organizations are advised to continuously monitor Windows Task Scheduler for unusual entries and ensure endpoint security measures are up-to-date.

Blocking unauthorized outbound connections to unfamiliar services can also help prevent successful intrusions. Staying informed about evolving threats and adapting security protocols accordingly remains crucial in defending against sophisticated cyber attacks like those orchestrated by Kimsuky.

Cyber Security News Tags:backdoor installation, cyber attack, cyber threat, Cybersecurity, IT security, Kimsuky, Kimsuky tactics, LNK files, malicious files, Malware, multi-stage attack, North Korean hackers, Python backdoor, security tools

Post navigation

Previous Post: React2Shell Exploitation: Large-Scale Attack Exposes Credentials
Next Post: North Korean Hackers Steal $285M from DeFi Platform

Related Posts

Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands Cyber Security News
GhostRedirector Hackers Compromise Windows Servers With Malicious IIS Module To Manipulate Search Results GhostRedirector Hackers Compromise Windows Servers With Malicious IIS Module To Manipulate Search Results Cyber Security News
Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence Cyber Security News
Hackers Exploit Critical Yearn Finance’s yETH Pool Vulnerability to Steal  Million in Ethereum Hackers Exploit Critical Yearn Finance’s yETH Pool Vulnerability to Steal $9 Million in Ethereum Cyber Security News
Critical React2Shell Vulnerability Under Attack Critical React2Shell Vulnerability Under Attack Cyber Security News
Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library
  • North Korean Hackers Steal $285M from DeFi Platform
  • Kimsuky Uses LNK Files to Deploy Python Backdoor
  • React2Shell Exploitation: Large-Scale Attack Exposes Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library
  • North Korean Hackers Steal $285M from DeFi Platform
  • Kimsuky Uses LNK Files to Deploy Python Backdoor
  • React2Shell Exploitation: Large-Scale Attack Exposes Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark