Description

North Korean-linked threat actors, identified as Kimsuky (APT43), have been observed using two new malware strains, KLogEXE and FPSpy, as part of their spear-phishing campaigns. Also known by various aliases, including Sparkling Pisces and Velvet Chollima, Kimsuky has been active since at least 2012, earning a reputation for its effective spear-phishing techniques. The malware strains were discovered by Palo Alto Networks' Unit 42 researchers, who revealed that KLogEXE is a C++ variant of a keylogger previously known as InfoKey. KLogEXE is capable of tracking keystrokes, monitoring running applications, and logging mouse clicks. Meanwhile, FPSpy, linked to earlier malware variants, functions as a backdoor designed to gather system information, execute arbitrary commands, and enumerate files and folders on compromised machines. Both malware variants are delivered through spear-phishing emails, often accompanied by a ZIP file containing malicious payloads. The targets of this campaign are primarily organizations in Japan and South Korea. Despite the group's broad reach, this particular operation is highly targeted, with a focus on select industries and regions. Unit 42's analysis found similarities in the source code of KLogEXE and FPSpy, indicating that both malware strains likely originate from the same developer.