North Korean Hackers Shift Tactics: Kimsuky Adopts Lazarus Group Tools in New Campaign

By ✦ min read

Breaking — The North Korean threat actor Kimsuky has dramatically expanded its cyber arsenal by adopting tools originally used by the Lazarus Group, signaling a significant tactical shift in ongoing campaigns targeting South Korea, Brazil, and Germany, according to new research.

Over the past several months, cybersecurity analysts have observed Kimsuky using malware variants based on the PebbleDash platform — a toolset historically associated with Lazarus but appropriated by Kimsuky since at least 2021. The group now leverages legitimate tools such as Visual Studio Code tunneling, Cloudflare Quick Tunnels, the open-source DWAgent remote monitoring tool, and even large language models (LLMs).

“Kimsuky is evolving faster than we’ve seen before,” said a senior analyst at Kaspersky, which first identified the group in 2013. “Their integration of Lazarus infrastructure and new technologies like Rust programming shows a deliberate effort to increase stealth and persistence.”

The Campaigns

The attacks begin with spear-phishing emails containing malicious attachments disguised as documents. In some cases, the group contacts victims via instant messengers. Once a target opens the attachment, a variety of droppers (in JSE, PIF, SCR, EXE formats) deliver malware from two main clusters: PebbleDash and AppleSeed.

North Korean Hackers Shift Tactics: Kimsuky Adopts Lazarus Group Tools in New Campaign
Source: securelist.com

Specific PebbleDash malware observed includes HelloDoor, httpMalice, MemLoad, and httpTroy. From the AppleSeed cluster, researchers found AppleSeed and HappyDoor. These are considered the group’s most technically advanced tools.

“The use of VSCode’s legitimate tunneling feature for persistence is particularly worrying,” added the analyst. “It allows Kimsuky to blend in with normal development traffic.”

VSCode and DWAgent Tactics

Kimsuky establishes remote access by exploiting VSCode tunneling, authenticating through GitHub accounts. For post-exploitation, it deploys DWAgent, an open-source remote monitoring and management tool. These activities have affected various public and private entities in South Korea.

Command & Control Infrastructure

The group hosts its command-and-control infrastructure primarily on domains registered through a free South Korean hosting provider. It also uses hacked South Korean websites and tunneling services like Ngrok or VSCode tunnels to conceal communications.

North Korean Hackers Shift Tactics: Kimsuky Adopts Lazarus Group Tools in New Campaign
Source: securelist.com

Target Scope

Background

First identified by Kaspersky in 2013, Kimsuky has been active for over a decade. Historically considered less technically proficient than other North Korean APT groups, it has nonetheless demonstrated skill in crafting tailored spear-phishing emails and maintaining a proprietary malware arsenal.

This latest shift — borrowing from the Lazarus Group’s playbook — marks a notable escalation. “Kimsuky is now operating with an expanded toolbox that includes off-the-shelf and custom malware, making detection harder,” the Kaspersky analyst explained.

What This Means

The adoption of Lazarus-style tools and modern technologies suggests Kimsuky is closing the capability gap with other advanced persistent threats. Organizations in the defense and government sectors, particularly in South Korea, must reassess their defenses against sophisticated spear-phishing and tunneling-based intrusions.

Cybersecurity teams should monitor for unusual VSCode tunneling activity, especially when paired with GitHub authentication. The use of large language models hints at possible AI-assisted social engineering in future campaigns, demanding vigilance against increasingly convincing phishing lures.

“This is not just a one-off adaptation,” the analyst warned. “It signals a long-term strategic evolution that will likely continue.”

Tags:

Recommended

Discover More

Consciousness May Be Universe's Deepest Layer, New Theory Proposes5 Pillars of Successful Design Leadership: Balancing Manager and Lead RolesAI Agents Exploit Hidden Gaps as Flawed Code Floods – Security Defenses Face Urgent OverhaulFlutter 2026 Global Tour: Meet the Core Team at These Key EventsHow Fructose Hijacks Your Metabolism: 6 Key Questions Answered