Hackers in North Korea use a Python trick to evade fresh cyberattacks by stealing products.

Feb 12, 2025Ravie LakshmananIT Security / Cybercrime

, a North Korean-linked risk actor, has been caught using a new tactic that forces targets to copy and execute malicious code provided by them after they are tricked into running PowerShell as an executive.

The risk artist uses a” risk professional masquerades as a South Korean government official and over time develops rapport with a target before sending a spear-phishing email with a PDF attachment,” the Microsoft Threat Intelligence team stated in a series of articles posted on X.

Victims are persuaded to visit a URL with a list of steps to enroll their Windows system in order to study the alleged PDF document. They are advised to start PowerShell as an executive, copy/paste the script snippet into the terminal, and do it using the registration link.

If the victim doesn’t follow through, the malicious code downloads and installs a browser-based remote desktop application along with a document file with a defined PIN from a remote server.

” The prey device is then prompted to record the victim device using the saved certificate and PIN by a distant server.” This allows the danger professional to get the gadget and carry out data exfiltration”, Microsoft said.

The tech giant described using this tactic as a withdrawal from the danger actor’s customary tradecraft, saying it has been used in a few episodes since January 2025.

The Kimsuky is not the only North Korean hackers team to follow the settlement tactic, though. In order to solve a rumored issue with accessing the camera and microphone through the web browser, threat actors connected to the Contagious Interview plan allegedly tricked users into imitating and running a destructive demand on their Apple macOS systems using the Terminal software.

For attacks, together with those that have embraced the so-called approach, have taken off in a big way in recent months, in part driven by the fact that they rely on the goals to harm their own machines, thus bypassing security protections.

North Korean IT workers ‘ Arizona woman enters guilty pleas to operating a laptop farm.

The 48-year-old woman from the state of Arizona pleaded guilty to her role in the fictitious that allowed North Korean threat actors to work remotely in more than 300 U.S. companies by posing as U.S. citizens and residents.

In violation of international sanctions, the department reported that between October 2020 and October 2023, the activity generated more than$ 11.7 million in illicit revenue for and North Korea.

” Chapman, an American citizen, conspired with overseas IT workers from October 2020 to October 2023 to steal the identities of U. S. nationals and used those identities to apply for remote IT jobs and, in furtherance of the scheme, transmitted false documents to the Department of Homeland Security”, the DoJ .

” Chapman and her coconspirators obtained jobs at hundreds of U. S.companies, including Fortune 500 corporations, often through temporary staffing companies or other contracting organizations”.

The defendant, who was detained in May of this year, is also accused of operating a laptop farm by hosting several laptops at her home, giving the impression that the North Korean employees were employed abroad, but they were actually working remotely in China and Russia, according to the charges.

” As a result of the conduct of Chapman and her conspirators, more than 300 U. S.companies were impacted, more than 70 identities of U. S. person were compromised, on more than 100 occasions false information was conveyed to DHS, and more than 70 U. S. individuals had false tax liabilities created in their name”, the DoJ added.

The IT worker scheme has gotten worse as a result of increased law enforcement scrutiny, with reports of data extortion and theft.

North Korean IT employees have extorted victims by holding stolen proprietary data and code hostage until the businesses pay ransom demands, according to a U.S. Federal Bureau of Investigation ( FBI ) advisory last month. ” In some cases, North Korean IT professionals have publicly released the proprietary code of victim companies.”

Found this article interesting? To read more exclusive content we post, follow us on and Twitter.

DNS checker

Leave a Comment