A recent cyberattack campaign, dubbed “DEEP#DRIVE,” has been attributed to the North Korean Advanced Persistent Threat (APT) group, Kimsuky.
The operation, targeting South Korean businesses, government entities, and cryptocurrency users, employs advanced techniques involving Dropbox-hosted payloads and obfuscated PowerShell scripts to infiltrate systems and exfiltrate sensitive data.
The attackers utilized phishing emails containing malicious shortcut files (.lnk) disguised as legitimate documents, such as work logs and insurance forms.
These files exploited a common Windows behavior of hiding file extensions to trick users into executing malicious code.
Once opened, the .lnk files triggered PowerShell scripts that downloaded additional payloads from Dropbox, a trusted cloud storage platform.
This tactic allowed the attackers to bypass traditional security defenses by blending their activities with normal user behavior.
Key to the campaign’s success was its reliance on Dropbox for both payload delivery and data exfiltration.
By leveraging OAuth token-based authentication for Dropbox API interactions, the attackers seamlessly uploaded reconnaissance data, including system configurations and running processes, to designated folders.
The infrastructure was dynamic and short-lived, with critical Dropbox links being rapidly deactivated to evade detection and complicate analysis.
The DEEP#DRIVE campaign followed a sophisticated multi-stage attack chain:
The attackers employed various obfuscation techniques, such as Base64 encoding and junk code insertion, to evade detection by antivirus software and logging systems.
The tactics, techniques, and procedures (TTPs) observed in DEEP#DRIVE align closely with previous campaigns attributed to Kimsuky.
Known for targeting South Korea, Kimsuky has a history of leveraging trusted platforms like Dropbox for malware distribution and data exfiltration.
According to Securonix, the use of Korean-language phishing lures further reinforces the assessment that South Korea was the primary target.
The campaign highlights the growing trend of threat actors exploiting trusted cloud services to bypass traditional security measures.
By using platforms like Dropbox, attackers can evade network-layer defenses and increase the likelihood of successful infiltration.
To mitigate such threats, organizations are advised to:
%AppData%
.The DEEP#DRIVE campaign underscores the importance of vigilance in cybersecurity practices as threat actors continue to evolve their methods to exploit trusted platforms and evade detection.
Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here
Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has been…
A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the DeepSeek…
A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB), utilizing…
A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other esoteric…
A sophisticated phishing campaign orchestrated by a Russian-speaking threat actor has been uncovered, revealing the…
A sophisticated malware campaign has compromised over 1,500 PostgreSQL servers, leveraging fileless techniques to deploy…