CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 03, 2026

Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack

Cybersecurity News Archived Apr 03, 2026 ✓ Full text saved

A North Korean threat group known as Kimsuky has been caught running a cyberattack campaign that uses malicious Windows shortcut files, known as LNK files, to quietly install a Python-based backdoor on victim systems. The attack stays hidden across multiple stages, making it harder for security tools to detect before the final payload reaches the […] The post Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack appeared first on Cyber Security News .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Home Cyber Security News Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack A North Korean threat group known as Kimsuky has been caught running a cyberattack campaign that uses malicious Windows shortcut files, known as LNK files, to quietly install a Python-based backdoor on victim systems. The attack stays hidden across multiple stages, making it harder for security tools to detect before the final payload reaches the target machine. Kimsuky has been active for many years, well-known for targeting government agencies, research institutions, and individuals in South Korea and beyond. In this latest campaign, the group changed how it delivers malware compared to earlier attacks. While the overall goal remains the same — getting a Python backdoor running on a victim’s machine — the group added more steps in the middle of the attack chain. These steps make detection harder and give attackers more control over how the infection unfolds. Researchers at ASEC identified this shift and noted that the Kimsuky group made a clear structural change in how its malicious LNK files are executed. In the past, the attack flow moved from an LNK file to PowerShell and directly to a BAT file. In the recent version, the intermediate stage now runs through an XML file, a VBS file, a PS1 file, and finally a BAT file before reaching the payload. This expanded chain adds layers between each step, giving the malware more room to avoid detection. The LNK files in this campaign were disguised as everyday documents, with names like “Resume (Sungmin Park).hwp.lnk” and “Guide to Establishing Data Backup and Recovery Procedures (Reference).lnk”. These names are crafted to look convincing so users click on them without suspicion. Once opened, the LNK file triggers a hidden PowerShell script that creates a concealed folder at C:\windirr with hidden and system attributes, keeping it out of normal file browsing views. Normal Decoy File (Source – ASEC) The decoy HWP document displayed to the victim after LNK execution, designed to mask malicious activity running in the background. The impact of this campaign is serious. Once the backdoor is fully installed, the attacker gains remote command access over the infected machine. The threat actor can run shell commands, browse directories, upload and download files, delete files, and execute other programs. This level of access allows the attacker to silently monitor and extract sensitive data from the victim’s system for as long as the infection goes unnoticed. Multi-Stage Infection Mechanism The infection process is built across several connected stages, each designed to quietly move to the next without raising security alarms. After the LNK file is opened, the PowerShell script creates the hidden folder and drops three files: an XML task scheduler file (sch_ha.db), a VBS script (11.vbs), and a PowerShell script (pp.ps1). Registered Task Scheduler (Source – ASEC) The task named GoogleUpdateTaskMachineCGI__{56C6A980-91A1-4DB2-9812-5158E7E97388} registered on the victim system to maintain persistent execution every 17 minutes. The XML file registers a task scheduler named GoogleUpdateTaskMachineCGI, set to run every 17 minutes. This keeps the malware active even after a restart. When the VBS file runs, it launches pp.ps1, which collects system details including the username, running processes, OS version, public IP address, and antivirus information. The stolen data is then sent to the attacker through Dropbox, a legitimate cloud service used here to blend into normal network traffic and avoid detection. The PowerShell script responsible for harvesting victim system information and uploading it to the attacker’s Dropbox account. Part of the pp.ps1 Code (Source – ASEC) The pp.ps1 script also downloads a BAT file (hh.bat) from the attacker’s Dropbox account and executes it. This BAT file pulls two ZIP fragments from remote servers, merges them, and extracts the final payload to C:\winii. The archive holds a Python backdoor named beauty.py, registered as a task called GoogleExtension and launched via XML scheduler. Part of the hh.bat Code (Source – ASEC) The batch script responsible for downloading, merging ZIP fragments, and deploying the final Python backdoor onto the infected system. The backdoor connects to C2 server 45.95.186[.]232 port 8080, sends a “HAPPY” packet to confirm infection, and waits for commands. Users should avoid opening LNK files received through email or messaging apps, especially files disguised as documents. Organizations should monitor Windows Task Scheduler for suspicious entries with Google-themed names. Keeping endpoint security tools updated and blocking unauthorized outbound connections to unknown services can reduce the risk of a successful intrusion. Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google. RELATED ARTICLESMORE FROM AUTHOR Cyber Security News Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack Cyber Security News Hackers Abuse Trusted Platforms to Steal Bank Credentials From Philippine Users ChatGPT Malicious Chrome Extension “ChatGPT Ad Blocker” Steals ChatGPT Conversations Top 10 20 Best Application Performance Monitoring Tools in 2026 April 3, 2026 Best VPN For Linux In 2026 April 3, 2026 10 Best VPN For Privacy In 2026 April 2, 2026 Top 20 Best Digital Forensic Tools in 2026 April 2, 2026 12 Best AWS Monitoring Tools in 2026 March 30, 2026
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 03, 2026
    Archived
    Apr 03, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗