Hackers in North Korea use a Shell trick to evade fresh cyberattacks by stealing products.

Feb 12, 2025Ravie LakshmananIT Security / Cybercrime

, a North Korean-linked risk professional, has been caught using a new tactic that forces targets to copy and execute malicious code provided by them after they are tricked into running PowerShell as an executive.

The threat actor uses a” sic ] PDF attachment in a spear-phishing email to execute this tactic,” according to the Microsoft Threat Intelligence team in a series of posts shared on X.

Victims are persuaded to push a URL with a list of steps to enroll their Windows system in order to study the alleged PDF document. They are advised to establish PowerShell as an executive and copy/paste the code snippet into the connector before running it using the registration link.

If the victim doesn’t follow through, the malicious code downloads and installs a browser-based remote desktop application as well as a document file with a defined PIN from a remote server.

The target device is then registered using the saved certificate and PIN by sending a web request to a distant server. This allows the threat professional to get the gadget and carry out data exfiltration”, Microsoft said.

The tech giant described using this tactic as a withdrawal from the danger writer’s customary tradecraft, saying it has been used in a few episodes since January 2025.

The Kimsuky is not the only North Korean hackers team to follow the settlement tactic, though. In order to solve a rumored issue with accessing the camera and microphone through the web browser, threat actors affiliated with the Contagious Interview plan allegedly tricked users into imitating and running a destructive demand on their Apple MacOS systems using the Terminal software.

Such problems, together with those that have embraced the so-called approach, have taken off in a big way in recent months, in part driven by the fact that they rely on the goals to harm their own machines, thus bypassing security protections.

A woman from Arizona enters a guilty plea to operating a computer plantation for IT workers in North Korea

The 48-year-old girl from Arizona pleaded guilty to her role in the fictitious IT worker system that allowed North Korean danger actors to work remotely in more than 300 U.S. companies by posing as U.S. citizens and residents.

In violation of international sanctions between October 2020 and October 2023, the department reported that the activity generated more than$ 1 million in illicit revenue for and for North Korea.

” Chapman, an American citizen, conspired with overseas IT workers from October 2020 to October 2023 to steal the names of U. S. citizens and used those identities to apply for remote IT work and, in pursuit of the program, transmitted false documents to the Department of Homeland Security”, the DoJ .

” Chapman and her coconspirators obtained jobs at hundreds of U. S.companies, including Fortune 500 corporations, often through temporary staffing companies or other contracting organizations”.

The defendant, who was detained in May of this year, is also accused of operating a laptop farm by hosting several laptops at her home, giving the impression that the North Korean employees were employed there from home, but that they were actually based in China and Russia and were not connected to the company’s internal systems remotely.

” As a result of the conduct of Chapman and her conspirators, more than 300 U. S.companies were impacted, more than 70 identities of U. S. person were compromised, on more than 100 occasions false information was conveyed to DHS, and more than 70 U. S. individuals had false tax liabilities created in their name”, the DoJ added.

With reports of data extortion and exfiltration, the law enforcement’s scrutiny has escalated the IT worker scheme.

North Korean IT employees have extorted victims by holding the companies ‘ proprietary data and code hostage until ransom demands are met, according to a U.S. Federal Bureau of Investigation ( FBI ) advisory last month. ” In some cases, North Korean IT professionals have publicly released the proprietary code of victim companies.”

Found this article interesting? Follow us on and Twitter to access more exclusive content we post.

Leave a Comment