Nearly 9GB of Alleged Kimsuky Files Surface on DDoSecrets After DEF CON Release
Leaked files reveal Kimsuky’s cyber-espionage tools, stolen credentials, and operational details, exposing vulnerabilities in North Korea’s hacking unit, according to cybersecurity analysts.
- Last week at DEF CON 33, two hackers known as Saber and cyb0rg leaked 8.9GB of Kimsuky’s files via DDoSecrets after compromising a virtual workstation and VPS linked to ‘KIM’.
- Saber and cyb0rg say they gained access by compromising a virtual workstation and VPS linked to an operator called “KIM”, citing ethical objections to Kimsuky’s agenda.
- Delving into the archive reveals attack logs showing attempts to compromise South Korea’s Defense Counterintelligence Command and MFA email platform, alongside a PHP “Generator” toolkit and unknown binaries not flagged by VirusTotal.
- South Korean agencies have started reviewing the leak to harden networks and anticipate rapid reverse-engineering of implants for detection strategies.
- With insider-risk trend on display, the breach highlights vulnerabilities in clandestine cyber units and the performative timing at DEF CON 33 and publication in Phrack.
14 Articles
14 Articles
Researchers identify Chinese cybercriminal working for North Korean threat group
Cybersecurity researchers say they have identified an operative working for the DPRK threat group Kimsuky who is Chinese, potentially marking the first known case of direct foreign participation in Pyongyang’s state-backed cybercrime. In a report released at the DEF CON security conference in Las Vegas last week, two researchers claimed to have stolen data from […]
A mysterious state-sponsored hacker, initially linked to the North Korean group Kimsuky, has also been hacked. But analysis of the data leak has experts wondering: what if the operator was actually Chinese? The investigation is open.
A member of the North Korean hacker group Kimsuky reportedly suffered a massive leak of data, exposing tools and techniques used in cyberspyping and cryptocurrency theft operations. *** Filtration includes hundreds of GB of internal files, malware and campaign logs. Data is attributed to an operator known as “KIM”, linked to Kimsuky. Researchers do not rule out links with Chinese actors. An alleged member of the North Korean hacker group Kimsuky…
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium