Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea
    Cybersecurity

    DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

    adminBy adminApril 6, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananApr 06, 2026Malware / Threat Intelligence

    Threat actors likely associated with the Democratic People’s Republic of Korea (DPRK) have been observed using GitHub as command-and-control (C2) infrastructure in multi-stage attacks targeting organizations in South Korea.

    The attack chain, per Fortinet FortiGuard Labs, involves obfuscated Windows shortcut (LNK) files acting as the starting point to drop a decoy PDF document and a PowerShell script that sets the stage for the next phase of the attack. It’s assessed that these LNK files are distributed via phishing emails.

    As soon as the payloads are downloaded, the victim is displayed the PDF document, while the malicious PowerShell script runs silently in the background. The PowerShell script performs checks to resist analysis by scanning for running processes related to virtual machines, debuggers, and forensic tools. If any of those processes are detected, the script immediately terminates.

    Otherwise, it extracts a Visual Basic Script (VBScript) and sets up persistence using a scheduled task that launches the PowerShell payload every 30 minutes in a hidden window to sidestep detection. This ensures that the PowerShell script is executed automatically after every system reboot.

    The PowerShell script then profiles the compromised host, saves the result to a log file, and exfiltrates it to a GitHub repository created under the account “motoralis” using a hard-coded access token. Some of the GitHub accounts created as part of the campaign include “God0808RAMA,” “Pigresy80,” “entire73,” “pandora0009,” and “brandonleeodd93-blip.”

    The script then parses a specific file in the same GitHub repository to fetch additional modules or instructions, thus allowing the operator to weaponize the trust associated with a platform like GitHub to blend in and maintain persistent control over the infected host.

    Fortinet said that earlier iterations of the campaign relied on LNK files to spread malware families like Xeno RAT. It’s worth noting that the use of GitHub C2 to distribute Xeno RAT and its variant MoonPeak was documented by ENKI and Trellix last year. These attacks were attributed to a North Korean state-sponsored group known as Kimsuky.

    “Instead of depending on complex custom malware, the threat actor uses native Windows tools for deployment, evasion, and persistence,” security researcher Cara Lin said. “By minimizing the use of dropped PE files and leveraging LolBins, the attacker can target a broad audience with a low detection rate.” 

    The disclosure comes as AhnLab detailed a similar LNK-based infection chain from Kimsuky that ultimately results in the deployment of a Python-based backdoor.

    The LNK files, as before, execute a PowerShell script and create a hidden folder in the “C:\windirr” path to stage the payloads, including a decoy PDF and another LNK file that mimics a Hangul Word Processor (HWP) document. Also deployed are intermediate payloads to set up persistence and launch a PowerShell script, which then uses Dropbox as a C2 channel to fetch a batch script.

    The batch file then downloads two separate ZIP file fragments from a remote server (“quickcon[.]store”) and combines them together to create a single archive and extracts from it an XML task scheduler and a Python backdoor. The task scheduler is used to launch the implant.

    The Python-based malware supports the ability to download additional payloads and execute commands issued from the C2 server. The instructions allow it to run shell scripts, list directories, upload/download/delete files, and run BAT, VBScript, and EXE files.

    The findings also coincide with ScarCruft’s shift from traditional LNK-based attack chains to an HWP OLE-based dropper to deliver RokRAT, a remote access trojan exclusively used by the North Korean hacking group, per S2W. Specifically, the malware is embedded as an OLE object within an HWP document and executed via DLL side-loading.

    “Unlike previous attack chains that progressed from LNK-dropped BAT scripts to shellcode, this case confirms the use of newly developed dropper and downloader malware to deliver shellcode and the ROKRAT payload,” the South Korean security company said.

    attacks DPRKLinked GitHub hackers Korea MultiStage South targeting
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhy my next microcontroller will be an ESP32, not a Raspberry Pi Pico
    Next Article Hyperscaler backlogs show growing demand for AI infrastructure
    admin
    • Website

    Related Posts

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026

    IBM unveils security services for thwarting agentic attacks, automating threat assessment

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026

    Gemini blocked more than 99% of bad ads before they ran in 2025

    April 16, 2026

    I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell

    April 16, 2026

    IBM unveils security services for thwarting agentic attacks, automating threat assessment

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,346)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (826)
    • Tech Tools & Mobile / Apps (1,611)
    • WiFi / Internet & Networking (226)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026

    Gemini blocked more than 99% of bad ads before they ran in 2025

    April 16, 2026

    I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell

    April 16, 2026
    Most Popular
    • OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal
    • Gemini blocked more than 99% of bad ads before they ran in 2025
    • I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell
    • IBM unveils security services for thwarting agentic attacks, automating threat assessment
    • What Is Answer Engine Optimization? And How to Do It
    • Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger
    • COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for
    • Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.