Thursday, May 8, 2025
Homecyber securityRDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

Published on

SIEM as a Service

Follow Us on Google News

The AhnLab SEcurity intelligence Center (ASEC) has released a detailed analysis of a sophisticated cyber campaign dubbed “Larva-24005,” linked to the notorious North Korean hacking group Kimsuky.

This operation has been targeting critical sectors in South Korea, including software, energy, and financial industries since October 2023.

MS Office Vulnerabilities
Attack Method

Targeted Industries and Global Attack Vectors

The Larva-24005 operation focuses heavily on South Korean entities but has expanded its reach to include systems in the United States, China, Japan, Germany, Singapore, and several other nations.

- Advertisement - Google News

The campaign leverages a range of advanced tools and techniques to infiltrate these systems, exploiting vulnerabilities such as the infamous RDP vulnerability known as BlueKeep (CVE-2019-0708).

According to the Report, initial access to compromised systems was achieved through the exploitation of the BlueKeep RDP vulnerability.

Forensic evidence indicates that while RDP vulnerability scanners were present, there was no confirmed utilization in the actual breaches.

Instead, the attackers used a mix of phishing emails and other exploit vectors to deliver their payload.

MS Office Vulnerabilities
 variants developed from 2019 to 2024.

Phishing emails, sent to targets in South Korea and Japan, contained malicious attachments that exploited the Microsoft Office Equation Editor vulnerability (CVE-2017-11882), further enabling malware distribution.

Malware Ecosystem and System Proliferation

Once within the network, the threat actors employed droppers to install various malware suites:

  • RDPWrap: Facilitates persistent remote access by modifying system settings.
  • MySpy: Collects system information.
  • KimaLogger and RandomQuery: Keyloggers that capture user inputs.

These tools, alongside other utilities like RDPScanner for CLI and GUI, showcase Kimsuky’s strategic use of loaders and infection mechanisms to ensure continuous access and data exfiltration.

The infrastructure analysis revealed that the attackers predominantly used kr domains for their Command and Control (C2) operations.

For instance, the URLs http[:]//star7[.]kro[.]kr/login/help/show[.]php?_Dom=991 and http[:]//www[.]sign[.]in[.]mogovernts[.]kro[.]kr/rebin/include[.]php?_sys=7 were part of their communication channels, highlighting a sophisticated setup to manage the rerouting of traffic and potentially evade initial detection.

This campaign underscores the ongoing threat posed by state-sponsored actors like Kimsuky, who continue to refine their tactics and exploit known vulnerabilities to gain unauthorized access, illustrating the importance of timely patching and robust cybersecurity practices to thwart such advanced persistent threats.

Indicators of Compromise (IOCs)

Here are some of the IOCs associated with this campaign:

MD5URL/FQDN
1177fecd07e3ad608c745c81225e4544http[:]//star7[.]kro[.]kr/login/help/show[.]php?_Dom=991
14caab369a364f4dd5f58a7bbca34da6http[:]//star7[.]kro[.]kr/login/img/show[.]php?uDt=177
184a4f3f00ca40d10790270a20019bb4http[:]//www[.]sign[.]in[.]mogovernts[.]kro[.]kr/rebin/include[.]php?_sys=7
30bcac6815ba2375bef3daf22ff28698access-apollo-page[.]r-e[.]kr
46cd19c3dac997bfa1a90028a28b5045access-apollo-star7[.]kro[.]kr

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...