DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容。 文章主要讲的是朝鲜黑客组织利用GitHub作为C2基础设施进行多阶段攻击,目标是韩国的组织。攻击链从带有LNK文件的钓鱼邮件开始,这些LNK文件会释放一个诱饵PDF和PowerShell脚本。PowerShell脚本会检查虚拟机、调试器等进程,避免被分析。如果通过检查,它会提取VBScript并设置计划任务,每30分钟运行一次PowerShell脚本,以保持持久性。 接下来,PowerShell脚本会收集受感染主机的信息,并将结果保存到日志文件中,然后将这些信息外泄到GitHub仓库。GitHub账户包括motoralis等。此外,PowerShell脚本还会从GitHub仓库中解析特定文件以获取额外模块或指令。 Fortinet提到早期的攻击依赖LNK文件传播恶意软件家族如Xeno RAT,并指出这些攻击与朝鲜政府支持的Kimsuky组织有关。研究人员指出威胁行为者使用Windows原生工具进行部署、规避和持久性,从而降低检测率。 文章还提到AhnLab详细描述了类似的基于LNK的感染链,最终部署了一个基于Python的后门。LNK文件执行PowerShell脚本并在C:\windirr路径下创建隐藏文件夹来加载有效载荷。此外,还使用Dropbox作为C2通道下载批处理脚本和ZIP文件片段,最终提取任务调度程序和Python后门。 韩国安全公司S2W指出ScarCruft组织从传统的LNK攻击链转向基于HWP OLE的dropper来交付RokRAT远程访问木马。恶意软件嵌入HWP文档作为OLE对象,并通过DLL侧加载执行。 总结一下,文章主要讲述了朝鲜黑客组织利用GitHub和钓鱼邮件进行多阶段攻击的技术细节以及相关安全公司的分析。 </think> 朝鲜黑客组织利用GitHub作为C2基础设施,在针对韩国的多阶段攻击中使用钓鱼邮件传播恶意软件。攻击链涉及LNK文件、PowerShell脚本和诱饵PDF文档,并通过GitHub外泄数据和获取指令。研究人员指出该组织利用Windows原生工具降低检测率,并通过Dropbox等平台维持控制。 2026-4-6 16:24:0 Author: thehackernews.com(查看原文) 阅读量:2 收藏

Malware / Threat Intelligence

Threat actors likely associated with the Democratic People's Republic of Korea (DPRK) have been observed using GitHub as command-and-control (C2) infrastructure in multi-stage attacks targeting organizations in South Korea.

The attack chain, per Fortinet FortiGuard Labs, involves obfuscated Windows shortcut (LNK) files acting as the starting point to drop a decoy PDF document and a PowerShell script that sets the stage for the next phase of the attack. It's assessed that these LNK files are distributed via phishing emails.

As soon as the payloads are downloaded, the victim is displayed the PDF document, while the malicious PowerShell script runs silently in the background. The PowerShell script performs checks to resist analysis by scanning for running processes related to virtual machines, debuggers, and forensic tools. If any of those processes are detected, the script immediately terminates.

Otherwise, it extracts a Visual Basic Script (VBScript) and sets up persistence using a scheduled task that launches the PowerShell payload every 30 minutes in a hidden window to sidestep detection. This ensures that the PowerShell script is executed automatically after every system reboot.

The PowerShell script then profiles the compromised host, saves the result to a log file, and exfiltrates it to a GitHub repository created under the account "motoralis" using a hard-coded access token. Some of the GitHub accounts created as part of the campaign include "God0808RAMA," "Pigresy80," "entire73," "pandora0009," and "brandonleeodd93-blip."

The script then parses a specific file in the same GitHub repository to fetch additional modules or instructions, thus allowing the operator to weaponize the trust associated with a platform like GitHub to blend in and maintain persistent control over the infected host.

Fortinet said that earlier iterations of the campaign relied on LNK files to spread malware families like Xeno RAT. It's worth noting that the use of GitHub C2 to distribute Xeno RAT and its variant MoonPeak was documented by ENKI and Trellix last year. These attacks were attributed to a North Korean state-sponsored group known as Kimsuky.

"Instead of depending on complex custom malware, the threat actor uses native Windows tools for deployment, evasion, and persistence," security researcher Cara Lin said. "By minimizing the use of dropped PE files and leveraging LolBins, the attacker can target a broad audience with a low detection rate." 

The disclosure comes as AhnLab detailed a similar LNK-based infection chain from Kimsuky that ultimately results in the deployment of a Python-based backdoor.

The LNK files, as before, execute a PowerShell script and create a hidden folder in the "C:\windirr" path to stage the payloads, including a decoy PDF and another LNK file that mimics a Hangul Word Processor (HWP) document. Also deployed are intermediate payloads to set up persistence and launch a PowerShell script, which then uses Dropbox as a C2 channel to fetch a batch script.

The batch file then downloads two separate ZIP file fragments from a remote server ("quickcon[.]store") and combines them together to create a single archive and extracts from it an XML task scheduler and a Python backdoor. The task scheduler is used to launch the implant.

The Python-based malware supports the ability to download additional payloads and execute commands issued from the C2 server. The instructions allow it to run shell scripts, list directories, upload/download/delete files, and run BAT, VBScript, and EXE files.

The findings also coincide with ScarCruft's shift from traditional LNK-based attack chains to an HWP OLE-based dropper to deliver RokRAT, a remote access trojan exclusively used by the North Korean hacking group, per S2W. Specifically, the malware is embedded as an OLE object within an HWP document and executed via DLL side-loading.

"Unlike previous attack chains that progressed from LNK-dropped BAT scripts to shellcode, this case confirms the use of newly developed dropper and downloader malware to deliver shellcode and the ROKRAT payload," the South Korean security company said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/dprk-linked-hackers-use-github-as-c2-in.html
如有侵权请联系:admin#unsafe.sh