State-Linked Hacker Toolset Analysis & Defense Blueprint

Background: Recently, some unknown specialists uploaded several dumps from servers that, according to their claims, are related to Kimsuky (State sponsored) systems. As cybersecurity defenders, we need to analyze all these dumps to understand the threat actor’s digital weapons and exploits. Based on this analysis, we can implement appropriate defense layers to protect against such attacks.

Toolset used by that threat actors: This part is particularly interesting because, if you have dumps of all the systems, as a cybersecurity professional you can first examine their bash history to understand user activity. Based on this search, I have identified the toolsets that the threat actors have used or are currently using.

  • BetterOCR : This tools is helping to translate pdf and ocr components into different languages

enter image description here - IntelliJIdea2018.3 : Ide for ongoing work - minibeacon : http(s) beacon for Cobalt Strike enter image description here -TitanLdr : Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH enter image description here - proxyres : C lang library for proxy enter image description here - Custom-PE-Packer : Tool to evade from AV detection - blacklotus : A well known UEFI bootkit - RATandC2 : C2 and Rat coplex tool enter image description here - Cobalt strike component enter image description here - Muraena : tool for phishing and post phishing proxy activities enter image description here - Mettle & Winrar old exploit enter image description here

To protect environment from such threat need to execute noted activity

  • EDR/XDR installation on all server
  • Enable Secure Boot and force firmware update on all machines
  • Implement IDS/IPS on network layer
  • Phishing & Web Protection & Employees awareness training
  • Threat hunting