Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Kimsuky Uses LNK Files to Deploy Python Backdoor

Kimsuky Uses LNK Files to Deploy Python Backdoor

Posted on April 3, 2026 By CWS

A North Korean hacking group known as Kimsuky has been identified in a new cyber campaign leveraging malicious Windows shortcut files, or LNK files, to surreptitiously install a Python-based backdoor on targeted computers.

This complex attack unfolds in multiple stages, making it more challenging for security systems to detect the threat before the final payload is activated on the victim’s machine.

Evolution of Kimsuky’s Attack Strategy

Historically, Kimsuky has focused on government bodies, research facilities, and individuals primarily in South Korea and elsewhere. The group is notorious for evolving its methods, with the latest campaign showcasing a significant shift in malware delivery tactics.

The overarching objective remains to deploy a Python backdoor on compromised devices. However, Kimsuky has incorporated additional steps into the attack progression, enhancing obfuscation and control over the infection process.

New Structural Changes in Malware Execution

Researchers from ASEC have observed these recent modifications, indicating a redesigned execution flow for Kimsuky’s LNK files. Previously, the process transitioned from an LNK file directly via PowerShell to a BAT file. The revised approach now involves intermediary stages passing through an XML file, a VBS file, a PS1 script, and finally to a BAT file before reaching its final destination.

This complex chain introduces extra layers between stages, allowing the malware to evade detection effectively. The LNK files are disguised as common documents with innocuous titles like “Resume (Sungmin Park).hwp.lnk,” enticing users to open them without suspicion.

Implications of the Multi-Stage Infection Mechanism

Once executed, the LNK file activates a concealed PowerShell script that sets up a hidden directory at C:windirr, obscured by system and hidden file attributes. This directory is where the attack unfolds, dropping an XML task scheduler file, a VBS script, and a PowerShell script.

The XML file registers a task scheduler with a Google-themed name to execute persistently every 17 minutes. The VBS script then triggers the PowerShell script to gather critical system data and send it to the attackers via Dropbox, cleverly masking malicious activity within typical network traffic.

Subsequently, the PowerShell script downloads a BAT file, which fetches ZIP file fragments from remote servers, merges them, and extracts the final payload: a Python backdoor named beauty.py. This backdoor connects to a command-and-control server, awaiting further instructions.

Preventive Measures and Recommendations

To mitigate such threats, users should be cautious of LNK files received through email or messaging applications, particularly those mimicking ordinary documents. Organizations are advised to continuously monitor Windows Task Scheduler for unusual entries and ensure endpoint security measures are up-to-date.

Blocking unauthorized outbound connections to unfamiliar services can also help prevent successful intrusions. Staying informed about evolving threats and adapting security protocols accordingly remains crucial in defending against sophisticated cyber attacks like those orchestrated by Kimsuky.

Cyber Security News Tags:backdoor installation, cyber attack, cyber threat, Cybersecurity, IT security, Kimsuky, Kimsuky tactics, LNK files, malicious files, Malware, multi-stage attack, North Korean hackers, Python backdoor, security tools

Post navigation

Previous Post: React2Shell Exploitation: Large-Scale Attack Exposes Credentials
Next Post: North Korean Hackers Steal $285M from DeFi Platform

Related Posts

Urgent Alert: Craft CMS Vulnerability Under Attack Urgent Alert: Craft CMS Vulnerability Under Attack Cyber Security News
Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys Cyber Security News
Cybercriminals Exploit Microsoft Tools in New Phishing Scheme Cybercriminals Exploit Microsoft Tools in New Phishing Scheme Cyber Security News
Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks Cyber Security News
Critical Windows Vulnerability Exploit Released Critical Windows Vulnerability Exploit Released Cyber Security News
Critical Hikvision Vulnerability Risks Global Security Breaches Critical Hikvision Vulnerability Risks Global Security Breaches Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • INTERPOL’s MENA Cybercrime Sweep Nets 201 Arrests
  • Hackers Quickly Exploit Critical NGINX Vulnerability
  • Critical n8n Security Flaws Risk Remote Code Execution
  • Exchange Exploits and npm Worms: This Week’s Cyber Threats
  • Healthcare Data Breaches Affect Millions Across the U.S.

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • INTERPOL’s MENA Cybercrime Sweep Nets 201 Arrests
  • Hackers Quickly Exploit Critical NGINX Vulnerability
  • Critical n8n Security Flaws Risk Remote Code Execution
  • Exchange Exploits and npm Worms: This Week’s Cyber Threats
  • Healthcare Data Breaches Affect Millions Across the U.S.

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark