Security analysts have uncovered an active campaign delivering KimJongRAT, a remote-access Trojan linked to the North Korea–backed Kimsuky group, through weaponized .hta files aimed at Windows systems. The operation follows a tightly crafted infection sequence that focuses on collecting credentials and device information, using deceptive file names to encourage user engagement. Attackers distribute the payload as tax_notice.zip, which contains a malicious file impersonating a legitimate National Tax Notice.pdf, increasing the likelihood of victims opening it. After extraction, victims encounter an Ink file disguised as a tax document, allowing the attackers to mask the true execution path. Once launched, this file triggers mshta to decode a hidden Base64 URL and fetch additional components, seamlessly moving the victim into the next stage of the compromise. The downloaded tax.hta file, written in VBScript, then loads further payloads while using Google Drive links to bypass basic security checks that would normally detect suspicious server connections. The attack becomes more adaptive once inside the system, as the malware inspects the status of Windows Defender and adjusts its payload accordingly. If the antivirus is disabled, it retrieves v3.log, which ultimately deploys n64.log to harvest sensitive data ranging from browser information and encryption keys to cryptocurrency wallets and messaging-app credentials. When Windows Defender is active, the Trojan instead downloads PC.log, which performs similar data theft but also adds persistence via registry changes to ensure continuous monitoring and exfiltration. Indicators such as localized tax templates and Korean interface elements suggest this campaign is engineered for a specific regional audience rather than broad distribution. With HTA-based attacks remaining highly effective due to their ability to execute via mshta without typical warnings, organizations are urged to keep Windows security controls updated, enable file-extension visibility, and remain cautious when handling unsolicited attachments. Security vendors currently detect related files as Trojan.Agent.LlhK.Gen and Trojan.Downloader.VBS.Agent, helping defenders identify and block this evolving threat.
Cybersecurity researchers have uncovered four critical vulnerabilities in OpenClaw that can be chained together to enable data theft, privilege escalation, and long-term persistenc...
OpenAI confirmed that two employee devices were compromised as part of a broader supply chain attack involving malicious packages distributed through the TanStack JavaScript ecosys...
Gunra Ransomware has emerged as a significant cyber threat targeting Windows-based enterprise environments across multiple industries, including manufacturing, pharmaceuticals, and...