Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Target Pharma Firms with Malware

North Korean Hackers Target Pharma Firms with Malware

Posted on April 27, 2026 By CWS

Cybersecurity experts have uncovered a sophisticated cyberattack targeting pharmaceutical companies, orchestrated by the North Korean state-sponsored group, Kimsuky. This campaign employs malware hidden in what appears to be a legitimate Excel file, posing a significant threat to the pharmaceutical sector.

Malware Disguised as Business Document

The attackers target employees by sending a Windows shortcut file named ‘White Life Science ERP Specification.lnk,’ cleverly camouflaged to resemble a standard Excel spreadsheet. Upon opening the file, unsuspecting users activate a series of concealed scripts, executing malicious code without any visible indicators of compromise.

This deception strategy highlights the persistent reliance of advanced threat actors on basic yet effective tactics to infiltrate sensitive industries. By impersonating a reputable drug manufacturer, the attackers increase the credibility of their harmful document.

Technical Insight into the Attack

Wezard4u analysts have meticulously dissected the malware, identifying its multi-layered structure. The .lnk file serves as a container for various components, including a decoy Excel file, a PowerShell script, a JavaScript file, and a Windows Task Scheduler XML, all condensed into a 23,079-byte shortcut.

The malware’s execution chain — from LNK to XML to JavaScript to PowerShell — is designed to evade detection. The PowerShell script extracts and runs each component, maintaining a low profile. The attack chain’s complexity makes it challenging to identify at any single stage.

Impact and Protective Measures

The attack poses a substantial risk to the pharmaceutical industry, which safeguards sensitive research, patient data, and proprietary drug formulations. Kimsuky’s history of targeting academia, government, and research institutions now extends into life sciences, threatening to compromise confidential clinical data.

Security teams are advised to enable file extension visibility in Windows to prevent .lnk files from being mistaken for Excel documents. It is crucial to monitor and restrict PowerShell executions through SysWOW64 paths, audit scheduled tasks for unfamiliar entries, and flag unusual Dropbox API connections within corporate networks.

Additionally, incorporating the specific file hashes into endpoint detection systems will aid in swiftly identifying and isolating any compromised systems.

For ongoing updates and insights into cybersecurity threats, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source on Google.

Cyber Security News Tags:APT, cyber espionage, cyber threats, Cybersecurity, data protection, Excel malware, IT security, Kimsuky group, malware analysis, malware attack, North Korean hackers, pharma security, pharmaceutical cybersecurity, PowerShell, supply chain attack

Post navigation

Previous Post: EU Pushes Google to Share Anonymized User Data

Related Posts

31.4 Tbps DDoS Attack Via Aisuru Botnet Breaks Internet With New World Record 31.4 Tbps DDoS Attack Via Aisuru Botnet Breaks Internet With New World Record Cyber Security News
Urgent SonicWall Patch Released for Critical Vulnerabilities Urgent SonicWall Patch Released for Critical Vulnerabilities Cyber Security News
Mozilla Critiques Microsoft’s Copilot Installation Tactics Mozilla Critiques Microsoft’s Copilot Installation Tactics Cyber Security News
Preventing OAuth Consent Abuse in Entra ID Preventing OAuth Consent Abuse in Entra ID Cyber Security News
CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits Cyber Security News
New Tool Identifies Quantum-Weak Cryptography New Tool Identifies Quantum-Weak Cryptography Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails
  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails
  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark