Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Phishing Campaign Exploits GitHub as C2 Tool

North Korean Phishing Campaign Exploits GitHub as C2 Tool

Posted on April 3, 2026 By CWS

A recent cyber campaign attributed to North Korean state-sponsored groups is leveraging Windows LNK files to execute targeted phishing attacks on organizations in South Korea. This campaign notably utilizes GitHub, a trusted internet platform, as a covert Command and Control (C2) channel, enhancing its stealth and effectiveness.

GitHub as an Unlikely C2 Channel

Using GitHub for malicious purposes is particularly concerning due to its widespread trust and acceptance in corporate environments. The campaign’s traffic seamlessly blends with legitimate web activities, bypassing many security measures. This operation, active since at least 2024, has evolved in sophistication, with initial versions of LNK files being less obfuscated and linked to XenoRAT malware distribution.

Recent developments in the campaign include embedding decoding functions within the LNK file arguments and concealing encoded payloads within the files themselves. Attackers employ decoy PDF documents to give users the impression of legitimate file activity while executing malicious scripts in the background.

Targeted Attacks on South Korean Organizations

FortiGuard Labs, under analyst Cara Lin, has identified this campaign, noting that the decoy PDF titles indicate a focus on specific South Korean companies, hinting at a broader surveillance effort. The metadata patterns, such as the “Hangul Document” naming convention, align with techniques used by North Korean groups like Kimsuky, APT37, and Lazarus.

This campaign is classified as high severity because the compromised data can facilitate subsequent attacks. The attackers craft documents around pertinent topics in Korean business, such as financial proposals and strategic partnerships, to enhance their credibility.

Long-Term Surveillance and Data Collection

The operation’s objective appears to be sustained surveillance and intelligence gathering. By using scheduled tasks that activate every 30 minutes and private GitHub repositories for storing stolen data, the attackers maintain an ongoing presence in compromised systems unnoticed.

The attack initiates with the opening of what seems like a regular PDF document, which is actually an LNK file triggering a PowerShell script. This script, upon confirming the absence of virtual machines and forensic tools, sets up a persistent scheduled task and collects system information for upload to the attacker’s GitHub repository.

Mitigation and Security Recommendations

Organizations and users should be wary of unsolicited LNK and PDF files, regardless of their appearance. Monitoring for unusual PowerShell or VBScript activities and investigating unexpected GitHub API endpoint connections are crucial steps in mitigating these threats.

Stay informed by following us on Google News, LinkedIn, and X, and consider setting CSN as a preferred source in Google for timely updates.

Cyber Security News Tags:APT37, C2 channel, cyber threat, Cybersecurity, FortiGuard Labs, GitHub, Kimsuky, Lazarus, LNK files, Malware, North Korea, Phishing, PowerShell, VBScript, XenoRAT

Post navigation

Previous Post: Adobe Data Breach: 13 Million Records Allegedly Leaked
Next Post: Top 20 APM Tools to Enhance Application Performance

Related Posts

Android Packer Ducex Employs Serious Obfuscation Techniques and Detects Analysis Tools Presence Android Packer Ducex Employs Serious Obfuscation Techniques and Detects Analysis Tools Presence Cyber Security News
Microsoft to Add Brand Impersonation Protection Warning to Teams Calls Microsoft to Add Brand Impersonation Protection Warning to Teams Calls Cyber Security News
New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers Cyber Security News
15,200 OpenClaw Systems at Risk Due to Internet Exposure 15,200 OpenClaw Systems at Risk Due to Internet Exposure Cyber Security News
FBI Warns of Kimsuky Actors Leverage Malicious QR Codes to Target U.S. Organizations FBI Warns of Kimsuky Actors Leverage Malicious QR Codes to Target U.S. Organizations Cyber Security News
Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New SparkCat Malware Targets Crypto Wallets on Mobile Apps
  • Top Linux VPNs for 2026: Ensure Privacy and Security
  • Top 20 APM Tools to Enhance Application Performance
  • North Korean Phishing Campaign Exploits GitHub as C2 Tool
  • Adobe Data Breach: 13 Million Records Allegedly Leaked

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New SparkCat Malware Targets Crypto Wallets on Mobile Apps
  • Top Linux VPNs for 2026: Ensure Privacy and Security
  • Top 20 APM Tools to Enhance Application Performance
  • North Korean Phishing Campaign Exploits GitHub as C2 Tool
  • Adobe Data Breach: 13 Million Records Allegedly Leaked

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark