Kimsuky - Malicious LNK Files Deliver Python-Based Backdoor

Basically, a North Korean hacker group is using fake shortcut files to secretly install harmful software on computers.
Kimsuky, a North Korean hacker group, is using malicious LNK files to deploy a Python backdoor on victim systems. This multi-stage attack complicates detection efforts, posing serious risks to sensitive data. Stay alert and avoid opening suspicious files to protect your systems.
What Happened
A North Korean threat group known as Kimsuky has been caught running a sophisticated cyberattack campaign. This campaign utilizes malicious Windows shortcut files, or LNK files, to quietly install a Python-based backdoor on victim systems. The attack unfolds in multiple stages, making it increasingly difficult for security tools to detect the malicious activity before the final payload is executed.
Who's Affected
Kimsuky has a history of targeting government agencies, research institutions, and individuals, particularly in South Korea and beyond. This latest campaign showcases a shift in their tactics, indicating that they are evolving to bypass traditional security measures.
How It Works
The attack starts when a user opens an LNK file disguised as a common document, such as a resume or a guide. Once executed, this file triggers a hidden PowerShell script that creates a concealed folder on the victim's machine. This folder is designed to remain undetected, as it has hidden and system attributes.
The infection process involves a series of steps:
- LNK file → triggers a PowerShell script.
- PowerShell script creates a hidden folder and drops three files:
- An XML task scheduler file (sch_ha.db)
- A VBS script (11.vbs)
- A PowerShell script (pp.ps1)
- The XML file registers a scheduled task that runs every 17 minutes, ensuring the malware remains active even after system reboots.
Signs of Infection
Victims may notice unusual activity, such as the creation of hidden folders or unexpected scheduled tasks. The backdoor allows attackers to execute commands, browse directories, and extract sensitive data without raising alarms.
How to Protect Yourself
To mitigate the risk of infection from this campaign, users should:
- Avoid opening LNK files received via email or messaging apps, especially those disguised as legitimate documents.
- Monitor Windows Task Scheduler for suspicious entries, particularly those with Google-themed names.
- Keep endpoint security tools updated and block unauthorized outbound connections to unknown services.
By remaining vigilant and implementing these protective measures, individuals and organizations can reduce their risk of falling victim to Kimsuky's evolving tactics.