Nearly 9GB of Alleged Kimsuky Files Surface on DDoSecrets After DEF CON Release
Leaked files reveal Kimsuky’s cyber-espionage tools, stolen credentials, and operational details, exposing vulnerabilities in North Korea’s hacking unit, according to cybersecurity analysts.
- Last week at DEF CON 33, two hackers known as Saber and cyb0rg leaked 8.9GB of Kimsuky’s files via DDoSecrets after compromising a virtual workstation and VPS linked to ‘KIM’.
- Saber and cyb0rg say they gained access by compromising a virtual workstation and VPS linked to an operator called “KIM”, citing ethical objections to Kimsuky’s agenda.
- Delving into the archive reveals attack logs showing attempts to compromise South Korea’s Defense Counterintelligence Command and MFA email platform, alongside a PHP “Generator” toolkit and unknown binaries not flagged by VirusTotal.
- South Korean agencies have started reviewing the leak to harden networks and anticipate rapid reverse-engineering of implants for detection strategies.
- With insider-risk trend on display, the breach highlights vulnerabilities in clandestine cyber units and the performative timing at DEF CON 33 and publication in Phrack.
Insights by Ground AI
Does this summary seem wrong?
12 Articles
12 Articles
A mysterious state-sponsored hacker, initially linked to the North Korean group Kimsuky, has also been hacked. But analysis of the data leak has experts wondering: what if the operator was actually Chinese? The investigation is open.
Coverage Details
Total News Sources12
Leaning Left0Leaning Right0Center3Last UpdatedBias Distribution100% Center
Bias Distribution
- 100% of the sources are Center
100% Center
C 100%
Factuality
To view factuality data please Upgrade to Premium