Raleigh, NC

32°F
Clear Sky Humidity: 91%
Wind: 0 M/S

North Korean Hackers Use PowerShell to Trick Victims

North Korean Hackers Use PowerShell to Trick Victims

North Korean Hackers Use PowerShell to Trick Victims and Gain Control of Devices in New Cyberattack

A hacking group linked to North Korea, called Kimsuky, has been using a new trick to fool people into running harmful commands on their computers. 

They pretend to be South Korean government officials and build trust with their targets over time. Then, they send a fake email with a PDF attachment. 

When the victim tries to open the PDF, they are told to click a registration link for their Windows system. The link instructs them to: 

  1. Open PowerShell as an administrator. 

  1. Copy and paste the given code into the terminal. 

  1. Run the code—without knowing it’s harmful. 

This method allows the hackers to take control of the victim’s computer. 

The Microsoft Threat Intelligence team warned about this attack in a series of posts on X (formerly Twitter). 

Should the victim follow through, the malicious code downloads and installs a browser-based remote desktop tool, along with a certificate file with a hardcoded PIN from a remote server. 

The code then sends a web request to a remote server to register the victim device using the downloaded certificate and PIN. This allows the threat actor to access the device and carry out data exfiltration," Microsoft said. 

The tech giant said it observed the use of this approach in limited attacks since January 2025, describing it as a departure from the threat actor's usual tradecraft. 

It's worth noting that the Kimsuky is not the only North Korean hacking crew to adopt the compromise strategy. In December 2024, it was revealed that threat actors linked to the Contagious Interview campaign are tricking users into copying and executing a malicious command on their Apple macOS systems via the Terminal app so as to address a supposed problem with accessing the camera and microphone through the web browser. 

These types of attacks, including those using the ClickFix method, have become much more common in recent months. A key reason for their success is that they trick victims into infecting their own computers, allowing hackers to bypass security protections. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.