Security researchers have identified an ongoing, stealthy malware campaign targeting organizations in South Korea, with strong evidence linking it to North Korean state-sponsored threat actors such as Kimsuky and Lazarus Group. The campaign leverages malicious Windows shortcut (.lnk) files, often delivered via phishing, as the initial infection vector. Upon execution, a hidden PowerShell script is run, which uses GitHub as a command-and-control (C2) platform. By abusing the legitimate and widely trusted GitHub service, the attackers' C2 communications are effectively camouflaged within normal network traffic, making detection extremely difficult. The ultimate goal of the campaign appears to be espionage and long-term intelligence gathering.
Attribution: Suspected North Korean state-sponsored groups (Kimsuky, APT37, Lazarus).
This campaign demonstrates the continuing evolution of North Korean TTPs, focusing on stealth and the abuse of legitimate services:
T1204.002 - Malicious File) delivered via phishing. These files are disguised with icons and names of common document types (e.g., PDFs) to trick users.T1102.002 - Web Service). The PowerShell script communicates with attacker-controlled GitHub repositories, posting stolen data and pulling down new commands or payloads. This is a form of 'Living off the Trusted Site' (LOTS).The attack unfolds in several stages:
Recent versions of the malware have shown increased obfuscation, removing metadata that previously linked them to North Korean actors and hiding C2 instructions more deeply within the LNK file's arguments.
The primary goal of this campaign is espionage. By gaining a persistent foothold within South Korean organizations, the attackers can:
While not financially destructive in the way ransomware is, the long-term strategic damage from such intelligence gathering can be immense.
Detection Strategies:
api.github.com. This is a core component of D3FEND Process Analysis.github.com or api.github.com that are not known developer tools or web browsers can be an effective detection method. This is an application of D3FEND Network Traffic Analysis.powershell.exe or cmd.exe. EDR solutions can be configured to alert on the execution of PowerShell from a LNK file shortcut.Response Actions:
Filter outbound traffic to GitHub at the domain level for non-developer workstations to disrupt the C2 channel.
Mapped D3FEND Techniques:
Use Attack Surface Reduction (ASR) rules and PowerShell Constrained Language Mode to limit the capabilities of malicious scripts.
Mapped D3FEND Techniques:
Educate users to be suspicious of unexpected attachments, even if they appear to be documents.
The core of this attack's evasion is its use of GitHub for C2. While blocking GitHub entirely is not feasible for many organizations, granular outbound traffic filtering can be highly effective. Implement a proxy or firewall policy that restricts which devices can connect to github.com and api.github.com. For most users and servers, there is no legitimate reason to connect directly to GitHub's API. Limit this access to only developer workstations and build servers. For all other endpoints, block this traffic. This 'deny by default' posture for C2-like web services cripples the malware's ability to receive commands or exfiltrate data, rendering the initial compromise inert.
This attack relies on executing obfuscated PowerShell from a LNK file. The key to detection is robust PowerShell logging and analysis. Ensure that PowerShell Script Block Logging (Event ID 4104) and Module Logging (Event ID 4103) are enabled via Group Policy and that these logs are forwarded to your SIEM. This provides the full, de-obfuscated content of any executed script. Create detection rules that look for suspicious script content, such as keywords like Invoke-WebRequest or IWR paired with connections to api.github.com, or scripts that perform system reconnaissance. This allows you to see past the obfuscation and detect the malware's true intent.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats