Chaos Ransomware – Active IOCs
August 5, 2025SonicWall Warns of Gen 7 Firewall Attacks
August 5, 2025Chaos Ransomware – Active IOCs
August 5, 2025SonicWall Warns of Gen 7 Firewall Attacks
August 5, 2025Severity
High
Analysis Summary
Kimsuky is a North Korean advanced persistent threat (APT) group, also known as "Black Banshee". The group has been active since at least 2012 and is believed to be state-sponsored. Kimsuky is known for conducting cyber espionage operations and targeting organizations and individuals in various countries, including South Korea, Japan, and the United States. The group has been observed using various techniques to compromise its targets, such as phishing attacks, malware infections, and supply chain attacks. The group's ultimate goals and motivations are not well understood, but they are generally believed to be focused on intelligence gathering and political or economic gain. The tactics, techniques, and procedures (TTPs) used by the Kimsuky APT group are constantly evolving, but some of their most commonly used methods include:
- Phishing attacks: The group has been known to send phishing emails that contain malicious attachments or links to compromised websites.
- Malware infections: Kimsuky has been observed using various types of malware, including remote access trojans (RATs), backdoors, and wiper malware.
- Supply chain attacks: The group has been known to compromise legitimate software or websites to distribute malware to a wider audience.
- Lateral movement: Once the group has compromised a target, they use techniques such as network scanning, password cracking, and privilege escalation to move laterally within the victim's network.
- Data exfiltration: Kimsuky has been observed using various methods to steal data from its targets, including command-and-control servers, cloud storage services, and removable media.
In October 2022, Kimsuky was observed using mobile malware to target Android devices. Researchers gave the malicious APKs the names FastFire, FastViewer, and FastSpy by including the word Fast in the package name and describing each one's characteristics. This group has been conducting constant attacks on mobile devices to steal the target's information. Their sophisticated technique is Firebase, a standard service employed as the C&C server in FastFire. Furthermore, some attempts are being made to avoid detection by modifying Androspy, an open-source RAT. Sophisticated attack vectors, similar to FastViewer, are utilized to attack specified targets, and existing open sources are being leveraged to produce high-performance variations such as FastSpy. FastViewer and FastSpy were employed to attack South Koreans and all three APKs. The mobile targeting approach of the Kimsuky group is becoming more advanced, thus it is important to be cautious about sophisticated attacks aimed at Android smartphones or devices.
In May 2023, the Kimsuky group was observed using a new version of its reconnaissance malware, called ReconShark (an evolution of the threat actor's BabyShark malware toolset), in a global cyberespionage campaign. The malware is designed to gather information on targeted systems and exfiltrate that data back to the attackers. It is believed that the group uses this information to gain access to sensitive networks and steal valuable intellectual property.
Impact
- Data Theft and Espionage
- Sensitive Data Exposure
Indicators of Compromise
Domain Name
hvmeyq.viewdns.net
ygbsbl.hopto.org
MD5
ab442288aa405fb805ea27b0ce6e78d6
34e530326e77c4ff0d731a6d3a94a22a
ff38d0be1e59f6ce55c251449ecf02ec
SHA-256
87e8287509a79099170b5b6941209b5787140a8f6182d460618d4ed93418aff9
7b06e14a39ff68f75ad80fd5f43a8a3328053923d101a34b7fb0d55235ab170b
b98626ebd717ace83cd7c312f081ce260e00f299b8d427bfb9ec465fa4bdf28b
SHA-1
4073b266d507d016a64466e3dca401f892ae15c1
a9095ce9fd98f05dc1be254d640b3897bcafe44d
3818482b6787c1ce13f3efdbec90eaf61eb4a847
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- It is also recommended that individuals and organizations use secure and encrypted communication channels, such as VPNs and encrypted email when transmitting sensitive information.
- Additionally, the use of multi-factor authentication can help reduce the risk of sensitive information being stolen by attackers.