Decoding Kimsuky's Attack Chain: A Step-by-Step Analysis of PebbleDash Malware Deployment
Introduction
Over the past several months, security researchers have tracked a sophisticated North Korean threat actor known as Kimsuky (also tracked as APT43, Ruby Sleet, Black Banshee, Sparkling Pisces, Velvet Chollima, and Springtail). This group has been active since at least 2013, and while initially considered less technically advanced than other Korean-speaking APT groups, it has evolved significantly. Recent campaigns reveal a shift toward using a modular malware platform called PebbleDash—originally associated with the Lazarus Group—alongside innovative tools like VSCode Tunneling, Cloudflare Quick Tunnels, the open-source DWAgent remote monitoring tool, and even large language models (LLMs). This guide breaks down the step-by-step attack chain Kimsuky employs, from initial access to post-exploitation, providing defenders with a clear understanding of their tactics.

What You Need
- Familiarity with common threat actor TTPs and spear-phishing techniques
- Basic understanding of malware droppers and payloads (JSE, PIF, SCR, EXE formats)
- Knowledge of remote access trojans (RATs) and command-and-control (C2) infrastructure
- Access to threat intelligence feeds or sandbox environments for analysis (optional but helpful)
Step 1: Reconnaissance and Target Identification
Kimsuky first identifies organizations of interest, primarily in South Korea but occasionally in Brazil and Germany. Their focus includes defense sector entities (for PebbleDash malware) and government organizations (for AppleSeed malware). The group gathers publicly available information and uses social engineering to tailor their approach. This step is critical because the subsequent spear-phishing emails are highly customized to appear legitimate.
Step 2: Crafting and Delivering Spear-Phishing Emails
Attackers compose convincing emails that appear to come from trusted sources. They may contact targets via email or even instant messengers. The emails contain malicious attachments disguised as common documents (e.g., .doc, .pdf) or links that lead to download pages. The attachments are actually droppers in one of several formats: .JSE, .PIF, .SCR, or .EXE. The droppers are designed to evade basic email scanning and trick the user into opening them.
Step 3: Dropper Execution and Payload Delivery
Once the victim opens the attachment, the dropper executes and downloads or deploys the main payload. Kimsuky primarily uses two malware families: PebbleDash and AppleSeed. PebbleDash variants include HelloDoor, httpMalice, MemLoad, and httpTroy. AppleSeed comes with a companion loader called HappyDoor. The dropper may also use obfuscation techniques to avoid static detection.
Step 4: Establishing Persistence via VSCode Tunneling
A notable tactical shift is Kimsuky’s use of legitimate Visual Studio Code (VSCode) tunneling mechanisms. After initial compromise, attackers configure a VSCode tunnel using a GitHub authentication method. This creates a persistent, encrypted connection that blends in with normal developer traffic. The tunnel allows the attacker to remotely access the victim machine without triggering traditional firewall alerts. Alternatively, they may use Cloudflare Quick Tunnels for similar purposes.
Step 5: Post-Exploitation with Legitimate Tools
For deeper access, Kimsuky deploys the open-source DWAgent remote monitoring and management (RMM) tool. This gives them full remote control—file transfer, command execution, and screen viewing. They may also install other post-exploitation frameworks or keyloggers. The use of legitimate tools helps them evade security software that whitelists known-good applications.

Step 6: Command-and-Control Communication
C2 infrastructure is primarily hosted on domains registered through a free South Korean hosting provider. Occasionally, the group compromises legitimate South Korean websites to serve as redirectors or use tunneling services like Ngrok or the aforementioned VSCode tunnels. This layered approach makes takedown efforts more difficult. Data is exfiltrated over encrypted channels, often mimicking normal web traffic.
Step 7: Lateral Movement and Data Exfiltration
With persistent access, Kimsuky moves laterally across the network to reach high-value servers. They may use stolen credentials or exploit trust relationships. The ultimate goal is to exfiltrate sensitive documents, intellectual property, and intelligence. Given the group's focus on defense and government sectors, the stolen data likely supports North Korea's strategic interests.
Tips for Defenders
- Monitor for unusual VSCode tunnel activity – Look for processes like
code-tunnelor outbound connections to GitHub's authentication servers from non-developer workstations. - Inspect spear-phishing emails carefully – Pay attention to attachments with double extensions or scripts (JSE, PIF, SCR). Train users to report suspicious emails.
- Block known IOCs – Use threat intelligence feeds to block domains from South Korean free hosting providers often used by Kimsuky.
- Monitor for DWAgent – Although legitimate, DWAgent installation on a non-IT machine is a red flag. Create detection rules for its binary hashes and network signatures.
- Enable application whitelisting – Prevent execution of common dropper formats like JSE and SCR unless explicitly allowed.
- Use network segmentation – Limit lateral movement by segregating sensitive systems from general user workstations.
- Keep LLM usage monitored – Kimsuky has experimented with large language models; watch for unusual script generation or AI-assisted attack patterns.
By understanding these steps, security teams can better detect and respond to Kimsuky's evolving tactics. For a deeper technical dive, refer to the full threat report that inspired this guide.
Related Articles
- RubyGems Halts New Registrations Amid Surge of Malicious Package Uploads
- Extended Range Night Vision Using Infrared Laser Illumination
- Autonomous Defense Against Watering Hole Attacks: How SentinelOne's AI Stopped the CPU-Z Supply Chain Breach
- Craft Your Own Dual-Format 3D Printed Pinhole Camera for Wigglegrams
- Rise of SaaS-Focused Cyber Extortion: Vishing and SSO Attacks by Cordial and Snarky Spiders
- Cybersecurity Roundup: Landmark Sentencing and a New Cloud Credential Worm
- How to Leverage Frontier AI for Browser Vulnerability Hunting: A Step-by-Step Guide
- Deceptive Call History Apps: How 7.3 Million Downloads Led to Payment Theft