{"id":13483,"date":"2026-04-06T12:54:40","date_gmt":"2026-04-06T12:54:40","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13483"},"modified":"2026-04-06T12:54:40","modified_gmt":"2026-04-06T12:54:40","slug":"github-backed-malware-unfold-through-lnk-information-in-south-korea","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13483","title":{"rendered":"GitHub-Backed Malware Unfold through LNK Information in South Korea"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Hackers are abusing Home windows shortcut recordsdata and GitHub to run a stealthy, multi\u2011stage malware marketing campaign towards organizations in South Korea.<\/p>\n<p>The operation chains LNK recordsdata, PowerShell, and GitHub APIs to ship surveillance instruments whereas mixing into regular enterprise site visitors.The marketing campaign begins with weaponized LNK recordsdata that comprise hidden scripts as an alternative of easy shortcuts. <\/p>\n<p>These older samples uncovered wealthy metadata together with recurring file names, sizes, and \u201cHangul Doc\u201d labels a sample typically linked with North Korea\u2013aligned teams similar to Kimsuky, APT37, and Lazarus.<\/p>\n<p>Over time, the operators upgraded their tooling by including easy decoding capabilities and exhausting\u2011encoding <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/sidewinder-hackers\/\" type=\"post\" id=\"162384\" target=\"_blank\" rel=\"noreferrer noopener\">payloads immediately into the LNK arguments<\/a>. <\/p>\n<p>When victims open the lure, a respectable\u2011trying PDF aligned with Korean enterprise themes seems, whereas the PowerShell code executes silently within the background.<\/p>\n<p>Earlier waves <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/dprk-related-campaigns-with-lnk-and-github-c2\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">noticed since 2024 used primary string concatenation<\/a> to obscure a GitHub C2 URL and an entry token based on FortiGuard Labs.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-github-backed-malware\"><strong>GitHub-Backed Malware<\/strong><\/h2>\n<p>The decoded PowerShell script first checks whether or not it&#8217;s working in a lab by scanning for virtualization, debugging, and forensic instruments, together with VMware, VirtualBox, IDA, dnSpy, Wireshark, Fiddler, x64dbg, and Course of Hacker processes. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.fortinet.com\/blog\/threat-research\/dprk-related-campaigns-with-lnk-and-github-c2\/_jcr_content\/root\/responsivegrid\/table_content\/par\/image_copy_170990561_1539556313.img.png\/1775080804873\/fig2.png\" alt=\"LNK file with PowerShell script (Source : FortiGuard Labs).\"\/><figcaption class=\"wp-element-caption\">\u00a0LNK file with PowerShell script (Supply : FortiGuard Labs).<\/figcaption><\/figure>\n<\/div>\n<p>If any of those are discovered, the script exits instantly, blocking analysts from observing later levels. When no evaluation instruments are detected, the script reconstructs Base64\u2011encoded strings and writes a VBScript payload right into a randomly named folder below %Temp%.<\/p>\n<p>To outlive reboots, the malware registers a hidden <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/microsoft-replacing-vbscript\/\" type=\"post\" id=\"90660\" target=\"_blank\" rel=\"noreferrer noopener\">Scheduled Activity that runs the VBScript <\/a>each half-hour utilizing wscript.exe, with an extended, doc\u2011like activity title designed to mix into respectable entries. <\/p>\n<p>The most recent variants strip practically all figuring out metadata and maintain solely a decoder, p1, which takes a file path, size, and XOR key to unpack each a decoy PDF and the following\u2011stage PowerShell script. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.fortinet.com\/blog\/threat-research\/dprk-related-campaigns-with-lnk-and-github-c2\/_jcr_content\/root\/responsivegrid\/table_content\/par\/image_copy_170990561_978012583.img.png\/1775080973114\/fig4.png\" alt=\"LNK file with encoded data (Source : FortiGuard Labs).\"\/><figcaption class=\"wp-element-caption\">\u00a0LNK file with encoded knowledge (Supply : FortiGuard Labs).<\/figcaption><\/figure>\n<\/div>\n<p>This VBScript in flip re\u2011launches the PowerShell payload in a hidden window, guaranteeing ongoing execution with minimal person visibility. <\/p>\n<p>The script additionally collects detailed host knowledge OS model, construct, final boot time, and course of record and logs it in recordsdata named <timestamp>&#8211;<ip>-BEGIN.log earlier than importing them to a GitHub repository through the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/google-api-keys-leak-sensitive-data\/\" type=\"post\" id=\"179158\" target=\"_blank\" rel=\"noreferrer noopener\">API utilizing a hardcoded entry token<\/a>.<\/ip><\/timestamp><\/p>\n<p>Researchers traced these uploads to a GitHub person \u201cmotoralis,\u201d whose non-public repositories and contribution historical past line up with spikes in LNK\u2011based mostly phishing exercise noticed since 2025. <\/p>\n<p>Extra usernames, together with God0808RAMA, Pigresy80, entire73, pandora0009, and brandonleeodd93-blip, seem to type a wider infrastructure mixture of dormant and newly created accounts. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.fortinet.com\/blog\/threat-research\/dprk-related-campaigns-with-lnk-and-github-c2\/_jcr_content\/root\/responsivegrid\/table_content\/par\/image_1297986176_cop.img.png\/1775082022578\/fig9.png\" alt=\"Attacker's GitHub  (Source : FortiGuard Labs).\"\/><figcaption class=\"wp-element-caption\">Attacker\u2019s GitHub  (Supply : FortiGuard Labs).<\/figcaption><\/figure>\n<\/div>\n<p>Whereas some accounts keep quiet for months, others activate briefly to offer backup channels, making the C2 layer resilient towards takedowns.<\/p>\n<p>As a result of all payloads and logs are<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/repojacking-github\/\" type=\"post\" id=\"67516\" target=\"_blank\" rel=\"noreferrer noopener\"> saved in non-public GitHub repositories<\/a>, defenders can not examine them immediately, but the site visitors nonetheless seems like regular encrypted GitHub exercise typically allowed in company networks. <\/p>\n<p>This mirrors a broader development of menace actors hijacking trusted public platforms from developer companies to file\u2011sharing instruments to host malware and exfiltrate knowledge whereas evading URL and area\u2011based mostly blocking.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-final-stage-continuous-github-control\"><strong>Last stage: steady GitHub management<\/strong><\/h2>\n<p>Within the third stage, an easier PowerShell element focuses on maintaining a stay reference to the GitHub\u2011hosted C2. <\/p>\n<p>It frequently pulls instructions or further modules from a uncooked GitHub file path below the motoralis repository, utilizing the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/tornet-backdoor-exploits-windows-scheduled-tasks\/\" type=\"post\" id=\"119425\" target=\"_blank\" rel=\"noreferrer noopener\">Scheduled Activity created earlier<\/a> as its heartbeat. <\/p>\n<p>A devoted \u201cmaintain\u2011alive\u201d script additionally gathers stay community configuration knowledge and pushes it again to GitHub with the PUT methodology, saving logs below paths formatted as <date>_<time>&#8211;<ip>-Actual.log.<\/ip><\/time><\/date><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.fortinet.com\/blog\/threat-research\/dprk-related-campaigns-with-lnk-and-github-c2\/_jcr_content\/root\/responsivegrid\/table_content\/par\/image_1297986176_cop_1603139719.img.png\/1775082153422\/fig12.png\" alt=\"Attack chain (Source : FortiGuard Labs). \"\/><figcaption class=\"wp-element-caption\">Assault chain (Supply : FortiGuard Labs). <\/figcaption><\/figure>\n<\/div>\n<p>By chaining LNK shortcuts, native Home windows scripting (PowerShell and VBScript), Scheduled Duties, and GitHub APIs, the attackers keep away from conventional executable droppers and cut back their on\u2011disk footprint. <\/p>\n<p>Safety groups are suggested to deal with surprising LNK and doc recordsdata with warning, tighten monitoring round PowerShell and wscript exercise, and baseline GitHub utilization to identify uncommon API calls or entry patterns.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong>Observe us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cyber-threat-intel\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">LinkedIn<\/a>, and\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Immediate Updates and Set GBH as a Most popular Supply in\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.google.com\/preferences\/source?q=https:\/\/gbhackers.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google<\/a>.<\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Hackers are abusing Home windows shortcut recordsdata and GitHub to run a stealthy, multi\u2011stage malware marketing campaign towards organizations in South Korea. The operation chains LNK recordsdata, PowerShell, and GitHub APIs to ship surveillance instruments whereas mixing into regular enterprise site visitors.The marketing campaign begins with weaponized LNK recordsdata that comprise hidden scripts as an [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13485,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[129,8537,4716,556,216,982,1867],"class_list":["post-13483","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-files","tag-githubbacked","tag-korea","tag-lnk","tag-malware","tag-south","tag-spread"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13483"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13483\/revisions"}],"predecessor-version":[{"id":13484,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13483\/revisions\/13484"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13485"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-06 21:09:53 UTC -->