{
	"id": "551ec991-84df-4874-a8ae-6dd2783c7240",
	"created_at": "2026-04-06T00:18:15.480452Z",
	"updated_at": "2026-04-10T13:12:02.429134Z",
	"deleted_at": null,
	"sha1_hash": "2be079b1f1a1c3d242fa788b9cb123e1cd52c9b8",
	"title": "Cyber Security Services",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 4898949,
	"plain_text": "Cyber Security Services\r\nBy PricewaterhouseCoopers\r\nPublished: 2026-01-07 · Archived: 2026-04-05 14:57:44 UTC\r\nFrom detection and protection to response and recovery, stay ahead of cyber risk and build the resilience to take\r\non change with confidence. Put cyber security at the heart of how you transform.  \r\nRethink cyber risk and resilience\r\nDriven by constant disruption and ever-changing risk, tech-driven transformation is now a perpetual business-as-usual state for organisations instead of a one-time hit. Putting cyber security at the heart of this essential change\r\nand reinvention is critical to gaining trust, protecting your organisation’s reputation and building the resilience to\r\nprotect and create value.\r\nTransformation and cyber security are inextricably linked, whether you’re digitising supply chains, building\r\ncloud-based business models or developing responsible and secure ways to innovate with generative AI. Your\r\nreliance on technology – its complex interdependencies and the cyber security risk it brings – means the impact of\r\na cyber attack can be rapid and significant.\r\nKeeping your employees and customers safe, and protecting your organisation’s prized information and assets,\r\nmeans staying ahead of cyber security risk, not just responding to it.\r\nThrough our deep technical cyber security expertise and breadth of business knowledge, combined with our\r\npowerful technology alliances, we help organisations across all industries embrace this change with confidence.\r\nFrom strategy to delivery to incident response and recovery, we can help you stay ahead of cyber security threats\r\nto protect value and unlock new opportunities to accelerate growth.\r\n“As the way we live, work and connect with each other is increasingly digital first, cyber security must be\r\nembedded at the heart of everything we do. Only by working together to stay ahead of complex cyber risk\r\ncan we protect and strengthen the values on which our society is built.”\r\nAlex Petsopoulos,\r\nPartner, Cyber Security, PwC UK\r\nOur cyber security services\r\nhttps://www.pwc.co.uk/issues/cyber-security-data-privacy/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html\r\nPage 1 of 9\n\nWe’re at your side, working with you to safeguard customers’ data, your organisation, people and reputation. For\r\ncyber security that addresses today’s risks and provides a resilient foundation for growth, we have the technical\r\nknowledge and hands-on operational support you need.\r\nCyber security strategy and advisory\r\nReduce risk, improve operational resilience and embrace transformation confidently with the right cyber security\r\nstrategy. In a changing risk and regulatory landscape, we can help you shape and validate your strategy, advise\r\nleaders on cyber risk and demonstrate how cyber security can be a strategic enabler for your organisation’s\r\npurpose and growth ambitions.\r\nFind out more\r\nhttps://www.pwc.co.uk/issues/cyber-security-data-privacy/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html\r\nPage 2 of 9\n\nCyber security design and delivery\r\nImprove your operational capability and resilience by turning your cyber security strategy into a roadmap to\r\nenhance your systems and processes, testing and fine tuning your defences. Our cyber security solutions and\r\nexpertise enable you to detect evolving cyber security threats, remediate weaknesses, provide real-time decision-making, and protect assets and sensitive data.\r\nFind out more\r\nhttps://www.pwc.co.uk/issues/cyber-security-data-privacy/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html\r\nPage 3 of 9\n\nCyber security incident response and recovery\r\nRespond to, prepare for and recover from cyber security incidents with confidence. From forensic and on-demand\r\ntechnical response teams to legal and communications expertise, we can help you uncover an incident’s cause,\r\nidentify lessons learned and support you in rebuild and recovery. In the heat of an incident, we’re by your side.\r\nFind out more\r\nManaged Cyber Services\r\nStay ahead of complex and ever-evolving cyber security threats with us as your trusted cyber security business\r\npartner. Leave us to protect your sensitive data, provide reporting and advise leaders on risk by managing your\r\ncyber security defences for you, so you can focus on your organisation’s strategic agenda.\r\nFind out more\r\nHow we can help you\r\nSupport from strategy to delivery\r\nIntelligent tech you can trust\r\nWe’re building a secure digital society\r\nBacked by our broader capabilities\r\nSupport from strategy to delivery\r\nWe offer deep technical and industry insights to support boardrooms and operational teams, helping you\r\nimplement and deliver greater cyber resilience. From helping to shape a cyber security strategy that embraces AI\r\nhttps://www.pwc.co.uk/issues/cyber-security-data-privacy/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html\r\nPage 4 of 9\n\nand automation to dealing with risk reduction and assurance requests, our technical expertise is recognised as\r\nmarket leading by industry technology analysts.\r\nMeet the team\r\nIntelligent tech you can trust\r\nWe combine business and industry expertise with an ecosystem of Alliance partner technologies and our own\r\ncyber security platforms. Our technology is flexible and modular, so it can be adapted as your needs change and\r\nthe tech evolves. We’ll help you in choosing the right technology for your organisation and help you get maximum\r\nvalue.\r\nhttps://www.pwc.co.uk/issues/cyber-security-data-privacy/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html\r\nPage 5 of 9\n\nWe’re building a secure digital society\r\nEvery day, we’re working with clients, governments, regulators and our own cyber researchers to understand and\r\nprotect businesses and society from the critical risks we all face. Our work in cyber security services is proven.\r\nWe’re helping society embrace this challenge and can support your organisation with critical cyber decisions.\r\nBacked by our broader capabilities\r\nhttps://www.pwc.co.uk/issues/cyber-security-data-privacy/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html\r\nPage 6 of 9\n\nThe cyber advice we provide is backed by a breadth of business experience and insight. Our cyber security\r\nservices are also accompanied by a combination of global multi-disciplinary capabilities, whether you need\r\nsupport on operational resilience, risk and controls, cloud migration or embracing GenAI.\r\nDigital store\r\nToday’s world is fast-moving, uncertain and unpredictable. Our digital products have been built to help better\r\nunderstand and navigate your business issues so that you can adapt and grow in the face of disruption.\r\nhttps://www.pwc.co.uk/issues/cyber-security-data-privacy/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html\r\nPage 7 of 9\n\nWhy choose us?\r\nRecognised as a cyber security leader\r\nNamed a Leader in the IDC MarketScape: Worldwide Systems Integrators/Consultancies for Cybersecurity\r\nRead more\r\nNamed as a Leader in the IDC MarketScape: Worldwide Cyber Security Risk Management Services 2023 Vendor\r\nAssessment\r\nRead more\r\nIdentified as a Pacesetter in the ALM Intelligence Pacesetter Research, Cyber Security Consulting 2022\r\nRead more\r\nCertified by industry bodies\r\nhttps://www.pwc.co.uk/issues/cyber-security-data-privacy/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html\r\nPage 8 of 9\n\nJoining forces to transform businesses securely\r\nWe’re empowering our clients to meet the demands of digital society through high trust cyber security services.\r\nBy combining our expertise with our Alliance partners' technology most suited to their needs, we’re helping\r\norganisations solve their most critical business issues securely and embrace change with confidence.\r\nFeatured Insight - 4 items\r\nOur insights\r\nSource: https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html\r\nhttps://www.pwc.co.uk/issues/cyber-security-data-privacy/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html\r\nPage 9 of 9",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia",
		"MISPGALAXY"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html"
	],
	"report_names": [
		"tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html"
	],
	"threat_actors": [
		{
			"id": "aa73cd6a-868c-4ae4-a5b2-7cb2c5ad1e9d",
			"created_at": "2022-10-25T16:07:24.139848Z",
			"updated_at": "2026-04-10T02:00:04.878798Z",
			"deleted_at": null,
			"main_name": "Safe",
			"aliases": [],
			"source_name": "ETDA:Safe",
			"tools": [
				"DebugView",
				"LZ77",
				"OpenDoc",
				"SafeDisk",
				"TypeConfig",
				"UPXShell",
				"UsbDoc",
				"UsbExe"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "191d7f9a-8c3c-442a-9f13-debe259d4cc2",
			"created_at": "2022-10-25T15:50:23.280374Z",
			"updated_at": "2026-04-10T02:00:05.305572Z",
			"deleted_at": null,
			"main_name": "Kimsuky",
			"aliases": [
				"Kimsuky",
				"Black Banshee",
				"Velvet Chollima",
				"Emerald Sleet",
				"THALLIUM",
				"APT43",
				"TA427",
				"Springtail"
			],
			"source_name": "MITRE:Kimsuky",
			"tools": [
				"Troll Stealer",
				"schtasks",
				"Amadey",
				"GoBear",
				"Brave Prince",
				"CSPY Downloader",
				"gh0st RAT",
				"AppleSeed",
				"Gomir",
				"NOKKI",
				"QuasarRAT",
				"Gold Dragon",
				"PsExec",
				"KGH_SPY",
				"Mimikatz",
				"BabyShark",
				"TRANSLATEXT"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "760f2827-1718-4eed-8234-4027c1346145",
			"created_at": "2023-01-06T13:46:38.670947Z",
			"updated_at": "2026-04-10T02:00:03.062424Z",
			"deleted_at": null,
			"main_name": "Kimsuky",
			"aliases": [
				"G0086",
				"Emerald Sleet",
				"THALLIUM",
				"Springtail",
				"Sparkling Pisces",
				"Thallium",
				"Operation Stolen Pencil",
				"APT43",
				"Velvet Chollima",
				"Black Banshee"
			],
			"source_name": "MISPGALAXY:Kimsuky",
			"tools": [
				"xrat",
				"QUASARRAT",
				"RDP Wrapper",
				"TightVNC",
				"BabyShark",
				"RevClient"
			],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "c8bf82a7-6887-4d46-ad70-4498b67d4c1d",
			"created_at": "2025-08-07T02:03:25.101147Z",
			"updated_at": "2026-04-10T02:00:03.846812Z",
			"deleted_at": null,
			"main_name": "NICKEL KIMBALL",
			"aliases": [
				"APT43 ",
				"ARCHIPELAGO ",
				"Black Banshee ",
				"Crooked Pisces ",
				"Emerald Sleet ",
				"ITG16 ",
				"Kimsuky ",
				"Larva-24005 ",
				"Opal Sleet ",
				"Ruby Sleet ",
				"SharpTongue ",
				"Sparking Pisces ",
				"Springtail ",
				"TA406 ",
				"TA427 ",
				"THALLIUM ",
				"UAT-5394 ",
				"Velvet Chollima "
			],
			"source_name": "Secureworks:NICKEL KIMBALL",
			"tools": [
				"BabyShark",
				"FastFire",
				"FastSpy",
				"FireViewer",
				"Konni"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "71a1e16c-3ba6-4193-be62-be53527817bc",
			"created_at": "2022-10-25T16:07:23.753455Z",
			"updated_at": "2026-04-10T02:00:04.73769Z",
			"deleted_at": null,
			"main_name": "Kimsuky",
			"aliases": [
				"APT 43",
				"Black Banshee",
				"Emerald Sleet",
				"G0086",
				"G0094",
				"ITG16",
				"KTA082",
				"Kimsuky",
				"Larva-24005",
				"Larva-25004",
				"Operation Baby Coin",
				"Operation Covert Stalker",
				"Operation DEEP#DRIVE",
				"Operation DEEP#GOSU",
				"Operation Kabar Cobra",
				"Operation Mystery Baby",
				"Operation Red Salt",
				"Operation Smoke Screen",
				"Operation Stealth Power",
				"Operation Stolen Pencil",
				"SharpTongue",
				"Sparkling Pisces",
				"Springtail",
				"TA406",
				"TA427",
				"Thallium",
				"UAT-5394",
				"Velvet Chollima"
			],
			"source_name": "ETDA:Kimsuky",
			"tools": [
				"AngryRebel",
				"AppleSeed",
				"BITTERSWEET",
				"BabyShark",
				"BoBoStealer",
				"CSPY Downloader",
				"Farfli",
				"FlowerPower",
				"Gh0st RAT",
				"Ghost RAT",
				"Gold Dragon",
				"GoldDragon",
				"GoldStamp",
				"JamBog",
				"KGH Spyware Suite",
				"KGH_SPY",
				"KPortScan",
				"KimJongRAT",
				"Kimsuky",
				"LATEOP",
				"LOLBAS",
				"LOLBins",
				"Living off the Land",
				"Lovexxx",
				"MailPassView",
				"Mechanical",
				"Mimikatz",
				"MoonPeak",
				"Moudour",
				"MyDogs",
				"Mydoor",
				"Network Password Recovery",
				"PCRat",
				"ProcDump",
				"PsExec",
				"ReconShark",
				"Remote Desktop PassView",
				"SHARPEXT",
				"SWEETDROP",
				"SmallTiger",
				"SniffPass",
				"TODDLERSHARK",
				"TRANSLATEXT",
				"Troll Stealer",
				"TrollAgent",
				"VENOMBITE",
				"WebBrowserPassView",
				"xRAT"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434695,
	"ts_updated_at": 1775826722,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/2be079b1f1a1c3d242fa788b9cb123e1cd52c9b8.pdf",
		"text": "https://archive.orkl.eu/2be079b1f1a1c3d242fa788b9cb123e1cd52c9b8.txt",
		"img": "https://archive.orkl.eu/2be079b1f1a1c3d242fa788b9cb123e1cd52c9b8.jpg"
	}
}