Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Exploit GitHub in South Korea Cyber Attacks

North Korean Hackers Exploit GitHub in South Korea Cyber Attacks

Posted on April 6, 2026 By CWS

Recent investigations have revealed that cyber attackers linked to North Korea are leveraging GitHub as a command-and-control (C2) platform in a series of sophisticated cyber attacks targeting South Korean entities. The strategy, uncovered by Fortinet FortiGuard Labs, involves a multi-step assault initiated through obfuscated Windows shortcut (LNK) files, which are thought to be distributed via phishing emails.

Innovative Use of GitHub in Cyber Attacks

The attack begins when victims unknowingly download malicious payloads that include a decoy PDF document and a hidden PowerShell script. As the PDF distracts the user, the script executes silently, scanning for virtual machines or forensic tools. If such tools are detected, the script halts immediately to prevent analysis.

When uninterrupted, the PowerShell script extracts a Visual Basic Script (VBScript) and uses a scheduled task to ensure persistence by launching the malicious PowerShell payload every 30 minutes. This tactic helps maintain a covert presence on the infected system, allowing the script to run automatically after reboots.

Exfiltration and Command Manipulation

The PowerShell script further profiles the compromised system, saving the results to a log file and exfiltrating it to a GitHub repository managed by the account ‘motoralis’. Numerous GitHub accounts, such as ‘God0808RAMA’ and ‘brandonleeodd93-blip’, have been identified as part of this campaign, facilitating the attackers’ ability to fetch additional instructions or modules.

The attackers exploit GitHub’s trusted platform to blend in, making it difficult for security systems to detect malicious activity. This method allows for sustained and undetected control over infected machines.

Shifting Techniques and Broader Implications

Earlier versions of this campaign relied on LNK files to deploy malware such as Xeno RAT, with the use of GitHub C2 for distribution previously documented by ENKI and Trellix. The Kimsuky group, believed to be state-sponsored by North Korea, is linked to these operations.

Security expert Cara Lin notes that the attackers utilize native Windows tools to minimize detection, avoiding complex custom malware. This approach broadens the range of potential targets while maintaining a low profile.

In a related development, AhnLab has documented a similar LNK-based infection chain from Kimsuky, ultimately leading to the deployment of a Python-based backdoor. This method involves a complex chain of payloads, including decoy documents and batch scripts, to establish persistence and communication with a C2 server.

The findings coincide with ScarCruft’s transition from LNK-based attacks to using Hangul Word Processor (HWP) OLE-based droppers for delivering RokRAT, a remote access trojan linked to North Korean cyber operations. This shift highlights the evolving tactics of North Korean hackers as they continue to refine their methods to evade detection and achieve their objectives.

The Hacker News Tags:cyber attacks, Cybersecurity, DPRK, GitHub, GitHub C2, Hackers, Kimsuky, LNK files, Malware, North Korea, Phishing, PowerShell, RATs, South Korea, threat intelligence

Post navigation

Previous Post: Critical Fortinet Vulnerability Exploited, CISA Issues Warning
Next Post: Malicious PyPI AI Tool Steals Data via Trojanized Proxy

Related Posts

SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day The Hacker News
Are Forgotten AD Service Accounts Leaving You at Risk? Are Forgotten AD Service Accounts Leaving You at Risk? The Hacker News
Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials The Hacker News
Warlock Ransomware Exploits Unpatched SmarterMail Server Warlock Ransomware Exploits Unpatched SmarterMail Server The Hacker News
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack The Hacker News
Learn a Smarter Way to Defend Modern Applications Learn a Smarter Way to Defend Modern Applications The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious PyPI AI Tool Steals Data via Trojanized Proxy
  • North Korean Hackers Exploit GitHub in South Korea Cyber Attacks
  • Critical Fortinet Vulnerability Exploited, CISA Issues Warning
  • North Korea Leverages Modular Malware to Evade Detection
  • Google DeepMind Identifies Web Threats to AI Agents

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious PyPI AI Tool Steals Data via Trojanized Proxy
  • North Korean Hackers Exploit GitHub in South Korea Cyber Attacks
  • Critical Fortinet Vulnerability Exploited, CISA Issues Warning
  • North Korea Leverages Modular Malware to Evade Detection
  • Google DeepMind Identifies Web Threats to AI Agents

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark