Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Unveiling the Sophisticated Attack Vector: North Korea-Linked Hackers Utilize LNK Files and GitHub C2s to Launch Malicious Campaign



North Korea-linked hackers have launched a new cyber attack on organizations in South Korea, utilizing phishing LNK files with embedded scripts and GitHub as Command and Control (C2) servers. The campaign, which targets companies in South Korea, highlights the attackers' focus on stealth, evasion, and strategic thinking. Experts warn that users should remain vigilant against untrusted documents and monitor for unusual PowerShell or VBScript activity to stay protected from this evolving threat landscape.

  • North Korea-linked threat actors launched a complex cyber attack on organizations in South Korea using phishing LNK files with embedded scripts and GitHub as Command and Control (C2) servers.
  • The attack utilizes phishing emails carrying obfuscated LNK files that drop decoy PDFs and PowerShell scripts, setting the stage for further exploitation.
  • The use of LNK files with embedded decoding functions and encoded payloads is a hallmark of North Korea-linked attacks, indicating a sophisticated approach.
  • The attackers' use of decoy PDF titles and GitHub C2 infrastructure expands surveillance and gathering intelligence on specific organizations.
  • The campaign's reliance on legitimate tools like PowerShell and LolBins underscores the attackers' focus on stealth and evasion.
  • The attackers' strategic thinking involves using multiple GitHub accounts to manage operations and avoid detection while continuing data exfiltration.
  • Experts warn users to remain vigilant against untrusted documents and monitor for unusual activity in their environments.



  • North Korea-linked threat actors have once again demonstrated their cunning and sophistication in launching a complex cyber attack on organizations in South Korea. The attack, which utilizes phishing LNK files with embedded scripts and GitHub as Command and Control (C2) servers, has left experts scrambling to understand the extent of the breach.

    According to reports published by FortiGuard Labs, attackers began targeting users in South Korea via phishing emails carrying obfuscated LNK files that dropped a decoy PDF and a PowerShell script. This initial stage sets the stage for further exploitation, as the malicious script then runs silently in the background, dropping more malware and establishing persistence on compromised systems.

    The use of LNK files, which are typically associated with Windows executable files, has been a hallmark of North Korea-linked attacks in recent years. However, this latest campaign takes the familiar technique to new heights by embedding decoding functions and encoded payloads directly within the LNK file itself. This level of sophistication suggests that the attackers have refined their approach, making it increasingly difficult for defenders to detect and respond to the attack.

    Moreover, the inclusion of decoy PDF titles with a focus on targeting companies in South Korea indicates a deliberate effort to expand surveillance and gather intelligence on specific organizations. The use of GitHub as C2 infrastructure adds another layer of complexity to the attack vector, allowing attackers to coordinate their efforts and stay under the radar of traditional security controls.

    The campaign's reliance on legitimate tools and services – such as PowerShell and LolBins – also underscores the attackers' focus on stealth and evasion. By leveraging these widely used platforms, the threat actors can blend in with benign traffic and avoid detection by traditional security measures.

    Furthermore, the use of multiple GitHub accounts, both active and dormant, to manage operations and avoid detection while continuing data exfiltration highlights the attackers' strategic thinking. This approach allows them to maintain a low profile while simultaneously exploiting vulnerabilities in their chosen targets.

    In a particularly interesting twist, the attackers have recently employed a "keep-alive" script that regularly pulls commands from GitHub, maintaining a stable link with the C2 and enabling remote action control. This feature not only allows the threat actors to monitor the victim's network status in real-time but also provides them with further exploitation opportunities.

    Experts warn that users should remain vigilant against untrusted documents and monitor for unusual PowerShell or VBScript activity in their environments. The campaign serves as a stark reminder of the evolving nature of cyber threats and the need for continuous vigilance in the face of an ever-adapting threat landscape.

    In conclusion, the North Korea-linked attack utilizing phishing LNK files with embedded scripts and GitHub C2s represents a complex and sophisticated cyber campaign that demands attention from security professionals worldwide. As we continue to navigate this rapidly evolving threat environment, it is essential that we prioritize education, awareness, and proactive defense strategies to stay one step ahead of these cunning adversaries.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Unveiling-the-Sophisticated-Attack-Vector-North-Korea-Linked-Hackers-Utilize-LNK-Files-and-GitHub-C2s-to-Launch-Malicious-Campaign-ehn.shtml

  • https://securityaffairs.com/190413/uncategorized/phishing-lnk-files-and-github-c2-power-new-dprk-cyber-attacks.html

  • https://www.fortinet.com/uk/blog/threat-research/dprk-related-campaigns-with-lnk-and-github-c2

  • https://www.broadcom.com/support/security-center/protection-bulletin/malicious-lnk-delivery-and-github-based-c2-observed-in-new-dprk-campaign

  • https://www.cynet.com/attack-techniques-hands-on/what-are-lolbins-and-how-do-attackers-use-them-in-fileless-attacks/

  • https://medium.com/techiepedia/living-off-the-land-binaries-lolbins-how-attackers-abuse-trusted-windows-tools-8053138c4d23


  • Published: Mon Apr 6 15:17:35 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us