Kimsuky (Malware Family) By Fraunhofer FKIE Archived: 2026-04-05 22:59:02 UTC There is no description at this point. 2025-07-25 ⋅ Aryaka Networks ⋅ Aditya K. Sood, varadharajan krishnasamy The Operational Blueprint of Kimsuky APT for Cyber Espionage Kimsuky 2024-12-10 ⋅ Hunt.io ⋅ Hunt.io “Million OK !!!!” and the Naver Facade: Tracking Recent Suspected Kimsuky Infrastructure Kimsuky 2023-05-22 ⋅ AhnLab ⋅ ASEC Kimsuky Group Using Meterpreter to Attack Web Servers Kimsuky Meterpreter 2023-01-01 ⋅ ThreatMon ⋅ Seyit Sigirci (@h3xecute), ThreatMon Malware Research Team Unraveling the Layers: Analysis of Kimsuky's Multi-Staged Cyberattack Kimsuky 2022-08-26 ⋅ cocomelonc Malware development: persistence - part 9. Default file extension hijacking. Simple C++ example. Kimsuky 2022-08-09 ⋅ Medium walmartglobaltech ⋅ Jason Reaves, Joshua Platt Pivoting on a SharpExt to profile Kimusky panels for great good Kimsuky 2022-08-02 ⋅ ASEC ⋅ ASEC Analysis Team Word File Provided as External Link When Replying to Attacker’s Email (Kimsuky) Kimsuky 2022-04-20 ⋅ cocomelonc ⋅ cocomelonc Malware development: persistence - part 1. Registry run keys. C++ example. Agent Tesla Amadey BlackEnergy Cobian RAT COZYDUKE Emotet Empire Downloader Kimsuky 2022-01-05 ⋅ AhnLab ⋅ ASEC Analysis Team Analysis Report on Kimsuky Group’s APT Attacks (AppleSeed, PebbleDash) Appleseed Kimsuky PEBBLEDASH 2021-10-07 ⋅ S2W Inc. ⋅ Jaeki Kim, Kyoung-ju Kwak, Sojun Ryu Operation Newton: Hi Kimsuky? Did an Apple(seed) really fall on Newton’s head? Appleseed Kimsuky 2021-08-23 ⋅ InQuest ⋅ Dmitry Melikov Kimsuky Espionage Campaign Kimsuky 2020-12-15 ⋅ ⋅ KISA ⋅ KISA Operation MUZABI Kimsuky 2020-06-12 ⋅ ThreatConnect ⋅ ThreatConnect Research Team Probable Sandworm Infrastructure Avaddon Emotet Kimsuky 2020-03-10 ⋅ Virus Bulletin ⋅ Jaeki Kim, Kyoung-Ju Kwak (郭炅周), Min-Chang Jang Kimsuky group: tracking the king of the spear phishing Kimsuky MyDogs 2020-03-04 ⋅ MetaSwan's Lab ⋅ MetaSwan Kimsuky group's resume impersonation malware Kimsuky 2020-02-19 ⋅ Lexfo ⋅ Lexfo The Lazarus Constellation A study on North Korean malware FastCash AppleJeus BADCALL Bankshot Brambul Dtrack Duuzer DYEPACK ELECTRICFISH HARDRAIN https://malpedia.caad.fkie.fraunhofer.de/details/win.kimsuky Page 1 of 2 Hermes HOPLIGHT Joanap KEYMARBLE Kimsuky MimiKatz MyDoom NACHOCHEESE NavRAT PowerRatankba RokRAT Sierra(Alfa,Bravo, ...) Volgmer WannaCryptor 2020-02-18 ⋅ PWC UK ⋅ Kris McConkey, Sveva Vittoria Scenarelli Tracking ‘Kimsuky’, the North Korea-based cyber espionage group: Part 1 Kimsuky 2019-10-04 ⋅ Virus Bulletin ⋅ Jaeki Kim, Kyoung-ju Kwak, Min-Chang Jang Kimsuky group: tracking the king of the spear-phishing Kimsuky 2019-09-11 ⋅ Prevailion ⋅ Danny Adamitis, Elizabeth Wharton Autumn Aperture Kimsuky 2019-09-11 ⋅ Danny Adamitis Autumn Aperture Report Kimsuky 2019-06-10 ⋅ ⋅ ESTsecurity ⋅ Alyac [Special Report] APT Campaign 'Konni' & 'Kimsuky' Organizations Found in Common Kimsuky [TLP:WHITE] win_kimsuky_auto (20251219 | Detects win.kimsuky.) Source: https://malpedia.caad.fkie.fraunhofer.de/details/win.kimsuky https://malpedia.caad.fkie.fraunhofer.de/details/win.kimsuky Page 2 of 2