{"id":5657,"date":"2020-10-30T13:53:57","date_gmt":"2020-10-30T20:53:57","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5657"},"modified":"2024-04-26T13:21:09","modified_gmt":"2024-04-26T20:21:09","slug":"kimsuki-apt-update","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/","title":{"rendered":"Kimsuki APT Update"},"content":{"rendered":"<p>Author: Nathan Toporek<\/p>\n<p>TLP:WHITE<\/p>\n<h3>1. Executive Summary<\/h3>\n<p>On October 27, 2020 the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the US Cyber Command Cyber National Mission Force (CNMF) published a joint report summarizing multiple OSINT publications that identifies several tactics, techniques, and procedures (TTPs) associated with the North Korean advanced persistent threat group (APT) Kimsuki.<sup>1<\/sup> Kimsuki used these TTPs to gather intelligence on behalf of the North Korean government.<\/p>\n<p>The US Government refers to all malicious cyber activity from the North Korean Government as &#8220;HIDDEN COBRA.&#8221;<\/p>\n<h3>2. Analysis<\/h3>\n<p>The joint report found that Kimsuki has likely been active since 2012, and is likely tasked by the North Korean government with gathering intelligence on a global scale. Kimsuki uses social engineering tactics like spearphishing and watering hole attacks against victims; however, they are most likely to use spearphishing to gain initial access. Their past operations targeted experts, think tanks, and South Korean government groups using lures about foreign political issues, nuclear policy, and sanctions. The report details multiple Kimsuki TTPs, from initial access to exfiltration, each summarized below.<\/p>\n<h4>\u00a0 \u00a0 \u00a02.1. Initial Access (TA0001)<\/h4>\n<p style=\"padding-left: 40px;\">Kimsuki commonly uses spearphishing campaigns to gain initial access. The themes for campaigns often have to do with setting up a Skype interview with the victim where they appear on a television show. The first several emails may not contain malicious attachments, in an effort to build trust. At some point Kimsuki will deliver a malicious payload, and then cancel the interview. Other lures have included topics related to current events or issues of popular interest.<\/p>\n<h4>\u00a0 \u00a0 \u00a02.2. Execution (TA0002)<\/h4>\n<p style=\"padding-left: 40px;\">Kimsuki uses the Visual Basic malware family Babyshark to perform command execution via Windows PowerShell.<sup>2<\/sup><\/p>\n<h4>\u00a0 \u00a0 \u00a02.3. Persistence (TA0003)<\/h4>\n<p style=\"padding-left: 40px;\">Kimsuki achieves persistence via malicious browser extensions, augmenting system processes, leveraging the autostart program, using the remote desktop protocol (RDP), and changing files associated with various applications.<\/p>\n<h4>\u00a0 \u00a0 \u00a02.4. Privilege Escalation (TA0004)<\/h4>\n<p style=\"padding-left: 40px;\">Kimsuki performs privilege escalation by editing startup programs, changing file associations, and process injection. They have also used Metasploit&#8217;s &#8220;Win7Elevate&#8221; exploit to escalate privileges.<\/p>\n<h4>\u00a0 \u00a0 \u00a02.5. Defense Evasion (TA0005)<\/h4>\n<p style=\"padding-left: 40px;\">Kimsuki evades defenses by disabling the Windows firewall and disabling Windows security center service, deleting data after exfiltrating it to remove evidence, using trusted tools like mshta.exe to execute malicious JavaScript or Visual Basic script (VBS) files, and leveraging Metasploit&#8217;s &#8220;Win7Elevate&#8221; exploit yet again to inject code into the Internet Explorer process.<\/p>\n<h4>\u00a0 \u00a0 \u00a02.6. Credential Access (TA0006)<\/h4>\n<p style=\"padding-left: 40px;\">Kimsuki accesses victim credentials with malicious Chrome browser extensions, Windows&#8217; <em>ProcDump<\/em> tool, a PowerShell-based keylogger named <em>MECHANICAL<\/em>, and specially-tailored versions of <em>PHProxy<\/em> (an open-source, PHP-based web proxy).<\/p>\n<h4>\u00a0 \u00a0 \u00a02.7. Discovery (TA0007)<\/h4>\n<p style=\"padding-left: 40px;\">Kimsuki appears to rely on native operating system commands to gather system information, which they likely exfiltrate to a command and control (C&amp;C) server.<\/p>\n<h4>\u00a0 \u00a0 \u00a02.8. Collection (TA0009)<\/h4>\n<p style=\"padding-left: 40px;\">Kimsuki collects victim information via a malicious Hangul Word Processor (HWP) executable, keyloggers, and a Mac OS-specific Python tool designed to infect Mac OS systems. The HWP malware will email the contents of HWP files to actors prior to opening them for the user via a legitimate word processor.<\/p>\n<h4>\u00a0 \u00a0 \u00a02.9. Command and Control (TA0011)<\/h4>\n<p style=\"padding-left: 40px;\">Kimsuki performs C&amp;C via a modified TeamViewer client that disables the firewall and configures several Windows registry keys that affect how the client connects to the server. At another time, Kimsuki will execute this malicious client.<\/p>\n<h4>\u00a0 \u00a0 \u00a02.10. Exfiltration (TA0010)<\/h4>\n<p style=\"padding-left: 40px;\">Kimsuki exfiltrates data by encrypting data and emailing it to C&amp;C servers.<\/p>\n<h3>3. Prevention and Mitigation<\/h3>\n<p>CISA, the FBI, and CNMF recommend that users and organizations in Kimsuki&#8217;s target profile implement protections against spearphishing, enable multi-factor authentication, and train users on phishing awareness.<\/p>\n<h3>4. Indicators of Compromise<\/h3>\n<p>The joint report provided multiple domains, and URL paths associated with the Kimsuki APT group.<\/p>\n<h4>\u00a0 \u00a0 \u00a04.1. Indicators<\/h4>\n<table width=\"672\">\n<tbody>\n<tr>\n<td width=\"452\"><strong>Indicator<\/strong><\/td>\n<td width=\"220\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"452\">\n<p style=\"text-align: center;\">account[.]daum[.]unikftc[.]kr<\/p>\n<p style=\"text-align: center;\">account[.]daum[.]unikortv[.]com<\/p>\n<p style=\"text-align: center;\">account[.]daurn[.]pe[.]hu<\/p>\n<p style=\"text-align: center;\">amberalexander[.]ghtdev[.]com<\/p>\n<p style=\"text-align: center;\">amberalexander[.]ghtdev[.]com<\/p>\n<p style=\"text-align: center;\">beyondparallel[.]sslport[.]work<\/p>\n<p style=\"text-align: center;\">bigfile[.]pe[.]hu<\/p>\n<p style=\"text-align: center;\">cdaum[.]pe[.]hu<\/p>\n<p style=\"text-align: center;\">cloudmail[.]cloud<\/p>\n<p style=\"text-align: center;\">cloudnaver[.]com<\/p>\n<p style=\"text-align: center;\">coinone[.]co[.]in<\/p>\n<p style=\"text-align: center;\">com-download[.]work<\/p>\n<p style=\"text-align: center;\">com-option[.]work<\/p>\n<p style=\"text-align: center;\">com-ssl[.]work<\/p>\n<p style=\"text-align: center;\">com-sslnet[.]work<\/p>\n<p style=\"text-align: center;\">com-vps[.]work<\/p>\n<p style=\"text-align: center;\">comment[.]poulsen[.]work<\/p>\n<p style=\"text-align: center;\">cooper[.]center<\/p>\n<p style=\"text-align: center;\">csnaver[.]com<\/p>\n<p style=\"text-align: center;\">daum[.]net[.]pl<\/p>\n<p style=\"text-align: center;\">daum[.]unikortv[.]com<\/p>\n<p style=\"text-align: center;\">daurn[.]org<\/p>\n<p style=\"text-align: center;\">daurn[.]pe[.]hu<\/p>\n<p style=\"text-align: center;\">demand[.]poulsen[.]work<\/p>\n<p style=\"text-align: center;\">dept-dr[.]lab[.]hol[.]es<\/p>\n<p style=\"text-align: center;\">desk-top[.]work<\/p>\n<p style=\"text-align: center;\">downloadman06[.]com<\/p>\n<p style=\"text-align: center;\">dubai-1[.]com<\/p>\n<p style=\"text-align: center;\">eastsea[.]or[.]kr<\/p>\n<p style=\"text-align: center;\">gloole[.]net<\/p>\n<p style=\"text-align: center;\">help-navers[.]com<\/p>\n<p style=\"text-align: center;\">help[.]unikoreas[.]kr<\/p>\n<p style=\"text-align: center;\">helpnaver[.]com<\/p>\n<p style=\"text-align: center;\">hogy[.]desk-top[.]work<\/p>\n<p style=\"text-align: center;\">impression[.]poulsen[.]work<\/p>\n<p style=\"text-align: center;\">intemet[.]work<\/p>\n<p style=\"text-align: center;\">intranet[.]ohchr[.]accountprotect[.]work<\/p>\n<p style=\"text-align: center;\">jonga[.]ml<\/p>\n<p style=\"text-align: center;\">jp-ssl[.]work<\/p>\n<p style=\"text-align: center;\">kooo[.]gq<\/p>\n<p style=\"text-align: center;\">loadmanager07[.]com<\/p>\n<p style=\"text-align: center;\">login[.]bignaver[.]com<\/p>\n<p style=\"text-align: center;\">login[.]daum[.]kcrct[.]ml<\/p>\n<p style=\"text-align: center;\">login[.]daum[.]netaccounts[.]info<\/p>\n<p style=\"text-align: center;\">login[.]daum[.]unikortv[.]com<\/p>\n<p style=\"text-align: center;\">login[.]outlook[.]kcrct[.]ml<\/p>\n<p style=\"text-align: center;\">mail[.]unifsc[.]com<\/p>\n<p style=\"text-align: center;\">mailsnaver[.]com<\/p>\n<p style=\"text-align: center;\">member-authorize[.]com<\/p>\n<p style=\"text-align: center;\">member[.]daum[.]uniex[.]kr<\/p>\n<p style=\"text-align: center;\">member[.]daum[.]unikortv[.]com<\/p>\n<p style=\"text-align: center;\">member[.]navier[.]pe[.]hu<\/p>\n<p style=\"text-align: center;\">myaccount[.]nkaac[.]net<\/p>\n<p style=\"text-align: center;\">myaccounts[.]gmail[.]krinfos[.]com<\/p>\n<p style=\"text-align: center;\">myetherwallet[.]co[.]in<\/p>\n<p style=\"text-align: center;\">myetherwallet[.]com[.]mx<\/p>\n<p style=\"text-align: center;\">naver[.]co[.]in<\/p>\n<p style=\"text-align: center;\">naver[.]com[.]cm<\/p>\n<p style=\"text-align: center;\">naver[.]com[.]de<\/p>\n<p style=\"text-align: center;\">naver[.]com[.]ec<\/p>\n<p style=\"text-align: center;\">naver[.]com[.]mx<\/p>\n<p style=\"text-align: center;\">naver[.]com[.]pl<\/p>\n<p style=\"text-align: center;\">naver[.]com[.]se<\/p>\n<p style=\"text-align: center;\">naver[.]cx<\/p>\n<p style=\"text-align: center;\">naver[.]hol[.]es<\/p>\n<p style=\"text-align: center;\">naver[.]koreagov[.]com<\/p>\n<p style=\"text-align: center;\">naver[.]onegov[.]com<\/p>\n<p style=\"text-align: center;\">naver[.]pw<\/p>\n<p style=\"text-align: center;\">naver[.]unibok[.]kr<\/p>\n<p style=\"text-align: center;\">naverdns[.]co<\/p>\n<p style=\"text-align: center;\">net[.]tm[.]ro<\/p>\n<p style=\"text-align: center;\">nid[.]naver[.]com[.]se<\/p>\n<p style=\"text-align: center;\">nid[.]naver[.]corper[.]be<\/p>\n<p style=\"text-align: center;\">nid[.]naver[.]onektx[.]com<\/p>\n<p style=\"text-align: center;\">nid[.]naver[.]unibok[.]kr<\/p>\n<p style=\"text-align: center;\">nid[.]naver[.]unicrefia[.]com<\/p>\n<p style=\"text-align: center;\">nidlogin[.]naver[.]corper[.]be<\/p>\n<p style=\"text-align: center;\">nidnaver[.]email<\/p>\n<p style=\"text-align: center;\">nidnaver[.]net<\/p>\n<p style=\"text-align: center;\">ns[.]onekorea[.]me<\/p>\n<p style=\"text-align: center;\">nytimes[.]onekma[.]com<\/p>\n<p style=\"text-align: center;\">org-vip[.]work<\/p>\n<p style=\"text-align: center;\">preview[.]manage[.]orgview[.]work<\/p>\n<p style=\"text-align: center;\">pro-navor[.]com<\/p>\n<p style=\"text-align: center;\">read-hanmail[.]net<\/p>\n<p style=\"text-align: center;\">read-naver[.]com<\/p>\n<p style=\"text-align: center;\">read[.]tongilmoney[.]com<\/p>\n<p style=\"text-align: center;\">resetprofile[.]com<\/p>\n<p style=\"text-align: center;\">resultview[.]com<\/p>\n<p style=\"text-align: center;\">riaver[.]site<\/p>\n<p style=\"text-align: center;\">sankei[.]sslport[.]work<\/p>\n<p style=\"text-align: center;\">securetymail[.]com<\/p>\n<p style=\"text-align: center;\">servicenidnaver[.]com<\/p>\n<p style=\"text-align: center;\">smtper[.]cz<\/p>\n<p style=\"text-align: center;\">smtper[.]org<\/p>\n<p style=\"text-align: center;\">sslport[.]work<\/p>\n<p style=\"text-align: center;\">sslserver[.]work<\/p>\n<p style=\"text-align: center;\">ssltop[.]work<\/p>\n<p style=\"text-align: center;\">statement[.]poulsen[.]work<\/p>\n<p style=\"text-align: center;\">sts[.]desk-top[.]work<\/p>\n<p style=\"text-align: center;\">taplist[.]work<\/p>\n<p style=\"text-align: center;\">tiosuaking[.]com<\/p>\n<p style=\"text-align: center;\">top[.]naver[.]onekda[.]com<\/p>\n<p style=\"text-align: center;\">usernaver[.]com<\/p>\n<p style=\"text-align: center;\">view-hanmail[.]net<\/p>\n<p style=\"text-align: center;\">view-naver[.]com<\/p>\n<p style=\"text-align: center;\">vilene[.]desk-top[.]work<\/p>\n<p style=\"text-align: center;\">vpstop[.]work<\/p>\n<p style=\"text-align: center;\">webmain[.]work<\/p>\n<p style=\"text-align: center;\">webuserinfo[.]com<\/p>\n<p style=\"text-align: center;\">ww-naver[.]com<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"220\">C2 domains associated with Kimsuki<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"452\">\/home\/dwn[.]php?van=101<\/p>\n<p>\/home\/dwn[.]php?v%20an=101<\/p>\n<p>\/home\/dwn[.]php?van=102<\/p>\n<p>\/home\/up[.]php?id=NQDPDE<\/p>\n<p>\/test\/Update[.]php?wShell=201<\/td>\n<td width=\"220\">\n<p style=\"text-align: center;\">URL paths used by Kimsuki<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3>Endnotes<\/h3>\n<ol>\n<li>&#8220;Joint Cybersecurity Advisory &#8211; US-Cert &#8211; CISA.&#8221; 27 Oct. 2020, <a href=\"https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/TLP-WHITE_AA20-301A_North_Korean_APT_Focus_Kimsuky.pdf\">https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/TLP-WHITE_AA20-301A_North_Korean_APT_Focus_Kimsuky.pdf<\/a>. Accessed 28 Oct. 2020.<\/li>\n<li>&#8220;BabyShark, Software S0414 | MITRE ATT&amp;CK\u00ae.&#8221; 7 Oct. 2019, <a href=\"https:\/\/attack.mitre.org\/software\/S0414\/\">https:\/\/attack.mitre.org\/software\/S0414\/<\/a>. Accessed 29 Oct. 2020.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Nathan Toporek TLP:WHITE 1. Executive Summary On October 27, 2020 the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the US Cyber Command Cyber National Mission Force (CNMF) published a joint report summarizing multiple OSINT publications that identifies several tactics, techniques, and procedures (TTPs) associated with the North Korean advanced [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":3212,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[339,312,344,345],"class_list":{"0":"post-5657","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-apt","9":"tag-hidden-cobra","10":"tag-kimsuki","11":"tag-spearfishing","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Kimsuki APT Update<\/title>\n<meta name=\"description\" content=\"On October 27, 2020 the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the US Cyber Command Cyber National Mission Force (CNMF) published a joint report summarizing multiple OSINT publications that identifies several tactics, techniques, and procedures (TTPs) associated with the North Korean advanced persistent threat group (APT) Kimsuki.1 Kimsuki used these TTPs to gather intelligence on behalf of the North Korean government.The US Government refers to all malicious cyber activity from the North Korean Government as &quot;HIDDEN COBRA.&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kimsuki APT Update\" \/>\n<meta property=\"og:description\" content=\"On October 27, 2020 the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the US Cyber Command Cyber National Mission Force (CNMF) published a joint report summarizing multiple OSINT publications that identifies several tactics, techniques, and procedures (TTPs) associated with the North Korean advanced persistent threat group (APT) Kimsuki.1 Kimsuki used these TTPs to gather intelligence on behalf of the North Korean government.The US Government refers to all malicious cyber activity from the North Korean Government as &quot;HIDDEN COBRA.&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-30T20:53:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:21:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Kimsuki APT Update\",\"datePublished\":\"2020-10-30T20:53:57+00:00\",\"dateModified\":\"2024-04-26T20:21:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/\"},\"wordCount\":993,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"keywords\":[\"apt\",\"hidden cobra\",\"kimsuki\",\"spearfishing\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/\",\"name\":\"Kimsuki APT Update\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"datePublished\":\"2020-10-30T20:53:57+00:00\",\"dateModified\":\"2024-04-26T20:21:09+00:00\",\"description\":\"On October 27, 2020 the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the US Cyber Command Cyber National Mission Force (CNMF) published a joint report summarizing multiple OSINT publications that identifies several tactics, techniques, and procedures (TTPs) associated with the North Korean advanced persistent threat group (APT) Kimsuki.1 Kimsuki used these TTPs to gather intelligence on behalf of the North Korean government.The US Government refers to all malicious cyber activity from the North Korean Government as \\\"HIDDEN COBRA.\\\"\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/kimsuki-apt-update\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Kimsuki APT Update\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kimsuki APT Update","description":"On October 27, 2020 the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the US Cyber Command Cyber National Mission Force (CNMF) published a joint report summarizing multiple OSINT publications that identifies several tactics, techniques, and procedures (TTPs) associated with the North Korean advanced persistent threat group (APT) Kimsuki.1 Kimsuki used these TTPs to gather intelligence on behalf of the North Korean government.The US Government refers to all malicious cyber activity from the North Korean Government as \"HIDDEN COBRA.\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/","og_locale":"en_US","og_type":"article","og_title":"Kimsuki APT Update","og_description":"On October 27, 2020 the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the US Cyber Command Cyber National Mission Force (CNMF) published a joint report summarizing multiple OSINT publications that identifies several tactics, techniques, and procedures (TTPs) associated with the North Korean advanced persistent threat group (APT) Kimsuki.1 Kimsuki used these TTPs to gather intelligence on behalf of the North Korean government.The US Government refers to all malicious cyber activity from the North Korean Government as \"HIDDEN COBRA.\"","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/","og_site_name":"Infoblox Blog","article_published_time":"2020-10-30T20:53:57+00:00","article_modified_time":"2024-04-26T20:21:09+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Kimsuki APT Update","datePublished":"2020-10-30T20:53:57+00:00","dateModified":"2024-04-26T20:21:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/"},"wordCount":993,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","keywords":["apt","hidden cobra","kimsuki","spearfishing"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/","name":"Kimsuki APT Update","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","datePublished":"2020-10-30T20:53:57+00:00","dateModified":"2024-04-26T20:21:09+00:00","description":"On October 27, 2020 the Cybersecurity Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the US Cyber Command Cyber National Mission Force (CNMF) published a joint report summarizing multiple OSINT publications that identifies several tactics, techniques, and procedures (TTPs) associated with the North Korean advanced persistent threat group (APT) Kimsuki.1 Kimsuki used these TTPs to gather intelligence on behalf of the North Korean government.The US Government refers to all malicious cyber activity from the North Korean Government as \"HIDDEN COBRA.\"","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimsuki-apt-update\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Kimsuki APT Update"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5657"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5657\/revisions"}],"predecessor-version":[{"id":5660,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5657\/revisions\/5660"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3212"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}