Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Let’s Encrypt Halts Certificate Issuance Due to Let’s After
May 9, 2026
Home/Threats/Kimsuky Deploys Malicious LNK Files for Deliver Python-Based
Threats

Kimsuky Deploys Malicious LNK Files for Deliver Python-Based

The North Korean threat group Kimsuky has been observed deploying a new cyberattack campaign that leverages malicious Windows shortcut (LNK) files to deliver a Python-based backdoor onto victim...

Marcus Rodriguez
Marcus Rodriguez
April 3, 2026 4 Min Read
3 0

The North Korean threat group Kimsuky has been observed deploying a new cyberattack campaign that leverages malicious Windows shortcut (LNK) files to deliver a Python-based backdoor onto victim systems. This multi-stage attack methodology has been detailed in a recent analysis.

The attack stays hidden across multiple stages, making it harder for security tools to detect before the final payload reaches the target machine.

Kimsuky has been active for many years, well-known for targeting government agencies, research institutions, and individuals in South Korea and beyond.

In this latest campaign, the group changed how it delivers malware compared to earlier attacks.

While the overall goal remains the same — getting a Python backdoor running on a victim’s machine — the group added more steps in the middle of the attack chain.

These steps make detection harder and give attackers more control over how the infection unfolds.

Researchers at ASEC identified this shift and noted that the Kimsuky group made a clear structural change in how its malicious LNK files are executed.

In the past, the attack flow moved from an LNK file to PowerShell and directly to a BAT file. In the recent version, the intermediate stage now runs through an XML file, a VBS file, a PS1 file, and finally a BAT file before reaching the payload.

This expanded chain adds layers between each step, giving the malware more room to avoid detection.

The LNK files in this campaign were disguised as everyday documents, with names like “Resume (Sungmin Park).hwp.lnk” and “Guide to Establishing Data Backup and Recovery Procedures (Reference).lnk”.

These names are crafted to look convincing so users click on them without suspicion. Once opened, the LNK file triggers a hidden PowerShell script that creates a concealed folder at C:windirr with hidden and system attributes, keeping it out of normal file browsing views.

Normal Decoy File (Source - ASEC)
Normal Decoy File (Source – ASEC)

The decoy HWP document displayed to the victim after LNK execution, designed to mask malicious activity running in the background.

The impact of this campaign is serious. Once the backdoor is fully installed, the attacker gains remote command access over the infected machine.

The threat actor can run shell commands, browse directories, upload and download files, delete files, and execute other programs. This level of access allows the attacker to silently monitor and extract sensitive data from the victim’s system for as long as the infection goes unnoticed.

Multi-Stage Infection Mechanism

The infection process is built across several connected stages, each designed to quietly move to the next without raising security alarms.

After the LNK file is opened, the PowerShell script creates the hidden folder and drops three files: an XML task scheduler file (sch_ha.db), a VBS script (11.vbs), and a PowerShell script (pp.ps1).

Registered Task Scheduler (Source - ASEC)
Registered Task Scheduler (Source – ASEC)

The task named GoogleUpdateTaskMachineCGI__{56C6A980-91A1-4DB2-9812-5158E7E97388} registered on the victim system to maintain persistent execution every 17 minutes.

The XML file registers a task scheduler named GoogleUpdateTaskMachineCGI, set to run every 17 minutes. This keeps the malware active even after a restart. When the VBS file runs, it launches pp.ps1, which collects system details including the username, running processes, OS version, public IP address, and antivirus information. The stolen data is then sent to the attacker through Dropbox, a legitimate cloud service used here to blend into normal network traffic and avoid detection.

The PowerShell script responsible for harvesting victim system information and uploading it to the attacker’s Dropbox account.

Part of the pp.ps1 Code (Source - ASEC)
Part of the pp.ps1 Code (Source – ASEC)

The pp.ps1 script also downloads a BAT file (hh.bat) from the attacker’s Dropbox account and executes it. This BAT file pulls two ZIP fragments from remote servers, merges them, and extracts the final payload to C:winii.

The archive holds a Python backdoor named beauty.py, registered as a task called GoogleExtension and launched via XML scheduler.

Part of the hh.bat Code (Source - ASEC)
Part of the hh.bat Code (Source – ASEC)

The batch script responsible for downloading, merging ZIP fragments, and deploying the final Python backdoor onto the infected system.

The backdoor connects to C2 server 45.95.186[.]232 port 8080, sends a “HAPPY” packet to confirm infection, and waits for commands.

Users should avoid opening LNK files received through email or messaging apps, especially files disguised as documents. Organizations should monitor Windows Task Scheduler for suspicious entries with Google-themed names.

Keeping endpoint security tools updated and blocking unauthorized outbound connections to unknown services can reduce the risk of a successful intrusion.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Hackers Exploit Trusted Platforms to Steal Philippine

Next Post

F5 BIG-IP APM Devices Exposed to Active R Online Amid

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
ZiChatBot Malware Uses Zulip APIs for Command & REST Control
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us