Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Kimsuky Adopts Malwareless Phishing Tactics

December 2, 2024
Reading Time: 2 mins read
in Alerts
Kimsuky Adopts Malwareless Phishing Tactics

The North Korean hacking group Kimsuky has evolved its cyberattacks by employing malwareless phishing techniques that bypass endpoint detection and response (EDR) systems. These campaigns target researchers and organizations with a focus on North Korea, utilizing convincing emails to deceive victims into providing sensitive information. By avoiding traditional malware, these phishing attempts are more challenging for conventional security tools to detect, increasing their success rate.

A significant change in Kimsuky’s operations involves the shift from Japanese email services to Russian domains for phishing campaigns. This transition has added another layer of complexity, as the use of Russian email providers makes it harder for recipients to identify fraudulent communications. Additionally, the group leverages free domain registration services like “MyDomain[.]Korea” to craft phishing sites that appear legitimate and trustworthy to unsuspecting victims.

The group’s phishing emails frequently impersonate public institutions, financial organizations, and email security managers, often incorporating financial themes to lure victims into interaction. Researchers identified multiple indicators of compromise (IoCs), including domains and IP addresses linked to the campaign. Notable domains include “National Secretary[.]Korea” and “Payment Due Date-Notice[.]Online,” which were used to build a false sense of credibility in their fraudulent schemes.

Cybersecurity experts emphasize the importance of heightened awareness and proactive measures to combat these threats. Organizations are advised to scrutinize email addresses carefully, implement robust security protocols, and update their threat intelligence to stay ahead of evolving tactics. As Kimsuky continues to refine its approach, vigilance remains essential to protecting sensitive information and maintaining cyber resilience against increasingly sophisticated phishing campaigns.

Reference:

  • Kimsuky Employs New Malwareless Phishing Techniques to Evade Detection
Tags: APT43Cyber AlertsCyber Alerts 2024Cyber threatsDecember 2024EDRkimsukyNorth KoreaPhishing
ADVERTISEMENT

Related Posts

Fortinet Flaw Used To Create Admins

Interview Campaign Exploits JSON Storage

November 18, 2025
Fortinet Flaw Used To Create Admins

Iran Hackers Launch SpearSpecter Spying

November 18, 2025
Fortinet Flaw Used To Create Admins

Fortinet Flaw Used To Create Admins

November 18, 2025
Dragon Breath Deploys Roninloader Ghosts

Rondodox Targets XWiki To Grow Botnet

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Windows 10 Update Error 800f0922

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Dragon Breath Deploys Roninloader Ghosts

November 17, 2025

Latest Alerts

Interview Campaign Exploits JSON Storage

Iran Hackers Launch SpearSpecter Spying

Fortinet Flaw Used To Create Admins

Rondodox Targets XWiki To Grow Botnet

Windows 10 Update Error 800f0922

Dragon Breath Deploys Roninloader Ghosts

Subscribe to our newsletter

    Latest Incidents

    Princeton Reports Donor Data Breach

    Massive Cloud DDoS Hits Microsoft Azure

    Kenyan Gov Sites Back Online After Hack

    Logitech Confirms Major Data Breach

    Hackers Steal Maternity Ward Videos

    Checkoutcom Rejects Hackers After Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial