Kimsuky, Velvet Chollima

Description

(Kaspersky) For several months, we have been monitoring an ongoing cyber-espionage campaign against South Korean think-tanks. There are multiple reasons why this campaign is extraordinary in its execution and logistics. It all started one day when we encountered a somewhat unsophisticated spy program that communicated with its “master” via a public e-mail server. This approach is rather inherent to many amateur virus-writers and these malware attacks are mostly ignored.

Names

NameName-Giver
KimsukyKaspersky
Velvet ChollimaCrowdStrike
ThalliumMicrosoft
Black BansheePWC
SharpTongueVolexity
ITG16IBM
TA406Proofpoint
TA427Proofpoint
APT 43Mandiant
ARCHIPELAGOGoogle
Emerald SleetMicrosoft
KTA082Kroll
UAT-5394Talos
Sparkling PiscesPalo Alto
SpringtailSymantec
Larva-24005AhnLab
Larva-25004AhnLab

Country

State-sponsored

Motivation

  • Information theft and espionage

First Seen

2012

Observed Sectors

Observed Countries

Tools

Operations

Counter Operations

Information

Mitre Attack

Other Information

Uuid

5e3544bf-98ad-4e9f-b65e-85f05c36486f

Last Card Change

2025-06-28