The North Korea-linked hacking group Kimsuky has stepped up its cyber operations. They are now using GitHub repositories as a platform to distribute malware and exfiltrate sensitive data—a sophisticated evolution in their tactics.
They’re leveraging malicious LNK files (Windows shortcuts) disguised as electronic invoices. What looks like a simple PDF file is actually the first step in a full-blown attack chain that can compromise your device.
At TecnetOne, we’ve analyzed this campaign because it exemplifies how cybercriminals exploit legitimate infrastructure to bypass security controls and maintain persistent access to compromised systems.
It begins with a ZIP file containing a shortcut file with an appealing name, such as:
전자세금계산서.pdf.lnk
(This means "electronic tax invoice" in Korean.)
Opening this LNK file triggers a PowerShell command that downloads and runs additional scripts hosted on private GitHub repositories controlled by the attackers.
That initial payload establishes the foundation for:
Researchers at S2W discovered at least nine private repositories linked to this campaign, with names like group_0717, hometax, and group_0803.
Shockingly, the attackers included GitHub personal access tokens directly in their PowerShell scripts. This gave them secure, structured access to their repositories—highlighting a high level of operational planning.
Even the commit history revealed email addresses tied to the campaign, such as:
sahiwalsuzuki4[@]gmail.com
Related titles: How to Detect and Remove Spyware Apps on Android
Once a device is infected, the malware runs a script named main.ps1, which creates another file in the %AppData% folder called:
MicrosoftEdgeUpdate.ps1
Then, it sets up an automated task called:
BitLocker MDM policy Refresh
This task runs every 30 minutes after a 5-minute delay. Its goal: continuously download and run new scripts from GitHub, ensuring the attackers retain access—even if passwords are changed or sessions are closed.
The malware features a dynamic system to manage scripts and organize stolen data:
This process allows attackers to track each infection, manage multiple compromised systems, and build a detailed intelligence archive.
The spyware component collects virtually everything it can find:
All of this is logged and uploaded back to the attackers’ repositories—creating a “control panel” of infected systems.
This campaign raises major red flags for several reasons:
For attackers, this model is scalable and stealthy. For organizations, it’s a serious risk of prolonged, silent data breaches.
Read more: New Wiper-Type Malware for Linux in Go Modules on GitHub
At TecnetOne, we emphasize that the biggest threat is not just the sophistication of attackers—but our own lack of preparation.
Here’s how to respond:
Basic antivirus is not enough. At TecnetOne, we work with leading cybersecurity vendors to offer:
The Kimsuky campaign shows how state-backed hackers are refining their methods to evade defenses and maintain access to critical systems.
Using GitHub as a malware distribution platform is a clear example of attackers abusing trusted infrastructure to fly under the radar.
Cybersecurity is no longer optional. You need a mix of prevention, detection, and fast response. At TecnetOne, we’re ready to help you strengthen your strategy—because every minute counts when stopping an attack.