A recent cyberattack campaign, dubbed “DEEP#DRIVE,” has been attributed to the North Korean Advanced Persistent Threat (APT) group, Kimsuky.
The operation, targeting South Korean businesses, government entities, and cryptocurrency users, employs advanced techniques involving Dropbox-hosted payloads and obfuscated PowerShell scripts to infiltrate systems and exfiltrate sensitive data.
The attackers utilized phishing emails containing malicious shortcut files (.lnk) disguised as legitimate documents, such as work logs and insurance forms.
These files exploited a common Windows behavior of hiding file extensions to trick users into executing malicious code.
Once opened, the .lnk files triggered PowerShell scripts that downloaded additional payloads from Dropbox, a trusted cloud storage platform.
This tactic allowed the attackers to bypass traditional security defenses by blending their activities with normal user behavior.
Key to the campaign’s success was its reliance on Dropbox for both payload delivery and data exfiltration.
By leveraging OAuth token-based authentication for Dropbox API interactions, the attackers seamlessly uploaded reconnaissance data, including system configurations and running processes, to designated folders.
The infrastructure was dynamic and short-lived, with critical Dropbox links being rapidly deactivated to evade detection and complicate analysis.
The DEEP#DRIVE campaign followed a sophisticated multi-stage attack chain:
The attackers employed various obfuscation techniques, such as Base64 encoding and junk code insertion, to evade detection by antivirus software and logging systems.
The tactics, techniques, and procedures (TTPs) observed in DEEP#DRIVE align closely with previous campaigns attributed to Kimsuky.
Known for targeting South Korea, Kimsuky has a history of leveraging trusted platforms like Dropbox for malware distribution and data exfiltration.
According to Securonix, the use of Korean-language phishing lures further reinforces the assessment that South Korea was the primary target.
The campaign highlights the growing trend of threat actors exploiting trusted cloud services to bypass traditional security measures.
By using platforms like Dropbox, attackers can evade network-layer defenses and increase the likelihood of successful infiltration.
To mitigate such threats, organizations are advised to:
%AppData%
.The DEEP#DRIVE campaign underscores the importance of vigilance in cybersecurity practices as threat actors continue to evolve their methods to exploit trusted platforms and evade detection.
Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released seven Industrial Control Systems (ICS) advisories…
The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing a…
Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research and…
A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that could…
As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and scale.…
ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned group…