ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Asset and Hidden Finances Investigations
      • Bug Sweep TSCM Investigation
    • Cyber Security
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > Uncategorized > North Korean Kimsuky hackers exposed in alleged data breach
    North Korean Kimsuky hackers exposed in alleged data breach
    11
    Aug
    • ForensicsS
    • 0 Comments

    North Korean Kimsuky hackers exposed in alleged data breach

    OSINT

    OSINT North Korea

    The North Korean advise-subsidized hacking community is known as Kimsuky has reportedly suffered a data breach after two hackers, who portray themselves as the reverse of Kimsuky’s values, stole the community’s data and leaked it publicly on-line.

    The two hackers, named ‘Saber’ and ‘cyb0rg,’ cited ethical causes for his or her actions, asserting Kimsuky is “hacking for all the wrong reasons,” claiming they’re pushed by political agendas and follow regime orders as an replace of practising the paintings of hacking independently.

    “Kimsuky, you are not a hacker. You are driven by financial greed, to enrich your leaders, and to fulfill their political agenda,” reads the hackers’ take care of to Kimsuky printed in essentially the most popular area of Phrack, which was dispensed on the DEF CON 33 convention.

    “You steal from others and favour your own. You value yourself above the others: You are morally perverted.”

    The hackers dumped a little bit of Kimsuky’s backend, exposing every their tooling and some of their stolen data that can presumably also provide perception into unknown campaigns and undocumented compromises.

    The 8.9GB dump currently hosted on the ‘Disbursed Denial of Secrets and tactics’‘ website online contains, among others:

    • Phishing logs with a pair of dcc.mil.kr (Protection Counterintelligence Insist) electronic mail accounts.
    • Other centered domains: spo.high-tail.kr, korea.kr, daum.rep, kakao.com, naver.com.
    • .7z archive containing your total offer code of South Korea’s Ministry of International Affairs electronic mail platform (“Kebi”), including webmail, admin, and archive modules.
    • References to South Korean citizen certificates and curated lists of university professors.
    • PHP “Generator” toolkit for building phishing sites with detection evasion and redirection tricks.
    • Live phishing kits.
    • Unknown binary archives (voS9AyMZ.tar.gz, Shaded.x64.tar.gz) and executables (payload.bin, payload_test.bin, s.x64.bin) no longer flagged in VirusTotal.
    • Cobalt Strike loaders, reverse shells, and Onnara proxy modules realized in VMware depart-and-fall cache.
    • Chrome history and configs linking to suspicious GitHub accounts (wwh1004.github.io, etc.), VPN purchases (PureVPN, ZoogVPN) through Google Pay, and frequent use of hacking boards (freebuf.com, xaker.ru).
    • Google Translate use for Chinese language error messages and visits to Taiwan executive and protection power sites.
    • Bash history with SSH connections to inner systems.

    The hackers ticket that some of the above are already known or previously documented, no much less than partly.

    On the opposite hand, the dump gives a weird dimension to the data and gives interlinking between Kimsuky’s instruments and actions, exposing and effectively “burning” the APT’s infrastructure and strategies.

    BleepingComputer has contacted a form of security researchers to substantiate the veracity of the leaked documents and its ticket and will replace the narrative if we compile a response.

    Whereas the breach will likely no longer comprise lengthy-term affect on Kimsuky’s operations, it could presumably also lead to operational difficulties for Kimsuky and disruptions to ongoing campaigns.

    The most popular area of Phrack (#72) is currently best probably available in a restricted physical copy, but the on-line version could presumably also simply unexcited be ready for folk to be taught without cost within the next days from here.


    OSINT Picus Blue Report 2025

    Be taught Extra

    • Tags

    • cybercrime cybersecurity email-fraud forensics|digital-forensics hacker Investigation Korean malware malwarephishing-attack North online-scam private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker

    Recent Posts

    • Ethiopian Migrants Face Kidnappings and Death, Leaving Within the aid of Heartbroken Households
    • Andrew Tate Hits TikTok & Zuckerberg’s Meta For $100M For Kicking Ex-Kickboxer Off Platforms Support In 2022: “It’s Correct Vs Inappropriate,” Accused Rapist Insists
    • Conservatives mock Comey over Taylor Swift video
    • The generation of AI hacking has arrived
    • Hackers unleash torrent from Norwegian dam, releasing 132 gallons per 2nd for four hours

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    Ethiopian Migrants Face Kidnappings and Death, Leaving Within the aid of Heartbroken Households
    Andrew Tate Hits TikTok & Zuckerberg’s Meta For $100M For Kicking Ex-Kickboxer Off Platforms Support In 2022: “It’s Correct Vs Inappropriate,” Accused Rapist Insists
    Conservatives mock Comey over Taylor Swift video
    August 17, 2025
    Conservatives mock Comey over Taylor Swift video

    Popular Tags

    administration Bongino calls Crypto Cyber cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity Department digital-forensics email-fraud Epstein FBI’s forensics|digital-forensics Former fraud hacker hackers Investigation Korea Korean Launches malware malwarefraud malwarephishing-attack Microsoft North online-scam online-scamphishing-attack orders Patel phishing-attack Police private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe South suspect Trump warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO