Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
ZiChatBot Malware Uses Zulip APIs for Command & REST Control
May 8, 2026
Hackers Use Hugging Face & ClawHub to Deploy Malware
May 8, 2026
Fake Moustache Bypasses Age Verification, Raises Online Safety
May 8, 2026
Home/Threats/North Korea Uses GitHub C2 in New LNK Korea-Related Campaign
Threats

North Korea Uses GitHub C2 in New LNK Korea-Related Campaign

North Korean state-sponsored threat actors have launched a new phishing campaign targeting organizations in South Korea. This newly identified operation leverages Windows shortcut files, known as LNK...

Jennifer sherman
Jennifer sherman
April 3, 2026 3 Min Read
4 0

North Korean state-sponsored threat actors have launched a new phishing campaign targeting organizations in South Korea. This newly identified operation leverages Windows shortcut files, known as LNK files, to initiate attacks, employing GitHub as a command and control (C2) mechanism. Details of this campaign, which abuses legitimate platforms for malicious ends, are outlined in a recent report FortiGuard Labs researchers, led by analyst Cara Lin, identified this campaign, noting that decoy PDF titles gathered from attack samples suggest the threat actor is deliberately targeting specific companies in South Korea as part of a broader surveillance effort.

Metadata patterns found in the LNK files, particularly the naming convention “Hangul Document,” align with tactics used by North Korean state-sponsored groups, including Kimsuky, APT37, and Lazarus.

The campaign has been rated High severity, since stolen data can fuel follow-on attacks, with Microsoft Windows as the affected platform.

The geographic focus and technical precision point to a calculated, resource-backed operation rather than opportunistic crime.

The threat actor carefully built lure documents around topics relevant to Korean business settings, such as financial proposals and strategic partnership agreements.

File names like “TRAMS WINBOT AI Strategic Proposal.pdf.lnk” and “(CONFIDENTIAL) AIN x Mine Korea 2026.pdf.lnk” show how deliberately each decoy was crafted to appear authentic and trustworthy to the recipient.

The broader purpose appears to be long-term surveillance and intelligence collection. By maintaining access through scheduled tasks that trigger every 30 minutes and using private GitHub repositories to store stolen logs and receive new instructions, the attacker monitors compromised systems quietly over time.

Since all communication runs over encrypted HTTPS traffic to a trusted domain, it routinely slips past standard perimeter defenses without raising flags.

Multi-Stage Infection Mechanism

The attack starts when a victim opens what looks like a regular PDF document. The file is actually an LNK shortcut that silently triggers a PowerShell script.

LNK file with PowerShell script (Source - Fortinet)
LNK file with PowerShell script (Source – Fortinet)

An XOR-based decoding function inside the LNK file extracts both the decoy PDF and the malicious script, while the decoy document distracts the victim.

LNK file with encoded data (Source - Fortinet)
LNK file with encoded data (Source – Fortinet)

Once active, the PowerShell script checks the environment for virtual machines, debuggers, and forensic tools.

Checks running process (Source - Fortinet)
Checks running process (Source – Fortinet)

If none are detected, it drops a VBScript file and sets up a scheduled task running the payload every 30 minutes to sustain persistence.

Dropped VBS script (Source - Fortinet)
Dropped VBS script (Source – Fortinet)

The script then collects OS version, boot time, and running process data, uploading it to an attacker-controlled GitHub repository.

Extracts system information and uploads to GitHub (Source - Fortinet)
Extracts system information and uploads to GitHub (Source – Fortinet)

In the final stage, the malware pulls new instructions from GitHub, while a keep-alive script sends live network data to the attacker for real-time monitoring.

Attack chain (Source - Fortinet)
Attack chain (Source – Fortinet)

Users and security teams should treat unsolicited LNK and PDF files with caution, regardless of appearance.

Environments should be monitored for unusual PowerShell or VBScript activity, and any unexpected outbound connections to GitHub API endpoints should be investigated immediately.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Best VPN For Linux In 2026

Next Post

North Korea Hackers Compromise Axios npm in Supply Chain Attack

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DarkMoon AI Autonomous Pen Testing Platform with 50+
May 8, 2026
RansomHouse Claims Access to Trellix Source Code Breach Parts
May 8, 2026
PCPJack Worm Targets Docker, Kubernetes, Redis Credential
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us