{"id":7707,"date":"2026-04-06T12:02:36","date_gmt":"2026-04-06T12:02:36","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=7707"},"modified":"2026-04-06T12:02:36","modified_gmt":"2026-04-06T12:02:36","slug":"north-korean-hackers-abuse-lnks-and-github-repos-in-ongoing-campaign","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=7707","title":{"rendered":"North Korean hackers abuse LNKs and GitHub repos in ongoing campaign"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>DPRK-linked threat actors are preferring stealth over sophistication in targeting South Korean organizations, as researchers report the use of weaponized Windows shortcut (<a href=\"https:\/\/www.csoonline.com\/article\/4132232\/four-new-reasons-why-windows-lnk-files-cannot-be-trusted.html\" target=\"_blank\" rel=\"noopener\">.LNK<\/a>) files and GitHub-based command-and-control (C2) channels in a new campaign.<\/p>\n<p>According to new Fortinet findings, a series of attacks that began in 2024 were found using a multi-stage scripting process and GitHub C2 to evade detection, with obfuscation improving with each iteration of the campaign.<\/p>\n<p>\u201cIn recent months, the threat actor has altered their tactics,\u201d Fortinet researchers said in a blog <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/dprk-related-campaigns-with-lnk-and-github-c2\">post<\/a>. \u201cThey now embed decoding functions within LNK arguments and include encoded payloads directly inside the files.\u201d The ongoing campaign seems to be targeted at expanding DPRK\u2019s surveillance within South Korea. The researchers noted that lesser obfuscation and heavier metadata in the previous iterations of the campaign allowed them to link it to attacks spreading the <a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:Win32\/XenoRat.AXNR!MTB&amp;ThreatID=2147945241\" target=\"_blank\" rel=\"noopener\">XenoRAT<\/a> malware.<\/p>\n<p>Jason Soroko, senior fellow at Sectigo, believes the strategy aligns with the recent trend of attackers relying on built-in Windows utilities and legitimate services to carry out their objectives. \u201cModern cyber espionage has fundamentally shifted toward a highly evasive strategy known as living off the land,\u201d he said, noting that attackers are increasingly abusing native tools like PowerShell and scheduled tasks to blend into normal system activity.<\/p>\n<p>LNK files are long <a href=\"https:\/\/www.csoonline.com\/article\/574425\/attackers-move-away-from-office-macros-to-lnk-files-for-malware-delivery.html\">known for<\/a> their history of exploitation, with Microsoft issuing multiple <a href=\"https:\/\/www.csoonline.com\/article\/4101085\/windows-shortcuts-use-as-a-vector-for-malware-may-be-cut-short.html\">patches<\/a> and <a href=\"https:\/\/www.techradar.com\/pro\/security\/microsoft-quietly-patches-lnk-vulnerability-thats-been-weaponized-for-years\" target=\"_blank\" rel=\"noopener\">advisories<\/a> over the years to curb their misuse.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>LNK files used as stealth loaders<\/h2>\n<p>The campaign begins its infection with a Windows shortcut file, which is typically used to launch applications or open documents, but can also embed commands to execute scripts or binaries.<\/p>\n<p>\u201cA .lnk file is how Windows handles shortcuts: Whenever you click on that Outlook icon on your desktop, you\u2019re actually clicking on a separate file that uses the Outlook image and directs the operating system to open up Microsoft Outlook,\u201d explained Jamie Boote, senior manager, strategic security consulting at Black Duck. \u201cYou can also create shortcut links (.lnk files) to websites, programs with additional commands, executable scripts, and just about anything else you could type into Windows\u2019s Run command window.\u201d<\/p>\n<p>The LNK files in the campaign use various scripts, including earlier versions with simple character concatenation to mask GitHub C2 address and the access token, the researchers said, adding that it was easy to determine that the script was meant to run a PowerShell command fetched from GitHub.<\/p>\n<p>Later versions shifted to basic character decoding functions, making detection a little trickier, but still had telling metadata like name, sizes, and modification dates that allowed researchers to connect it to the specific campaign. The name column repeatedly uses \u201cHangul document,\u201d a pattern consistent with state-affiliated groups like <a href=\"https:\/\/www.csoonline.com\/article\/3967013\/north-korea-backed-kimsuky-targets-unpatched-bluekeep-systems-in-new-campaign.html\">Kimsuky<\/a>, <a href=\"https:\/\/www.csoonline.com\/article\/4088037\/north-korean-hackers-exploit-googles-safety-tools-for-remote-wipe.html\">APT37<\/a>, and <a href=\"https:\/\/www.csoonline.com\/article\/3818521\/lazarus-group-tricks-job-seekers-on-linkedin-with-crypto-stealer.html\">Lazarus<\/a>.<\/p>\n<p>In its latest iteration, the campaign operators have removed the identifying metadata, now using only a decoding function within the arguments.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>GitHub as C2<\/h2>\n<p>Researchers also highlighted the campaign\u2019s use of GitHub as a C2 layer. Rather than communicating with suspicious-looking or newly registered domains, the malware interacts with GitHub repositories and APIs to receive instructions and exfiltrate data.<\/p>\n<p>\u201cThe fact that this shortcut file creates a chain that ultimately reaches out to a GitHub repository, and pulls scripts over the internet, should put network defenders on alert that even productivity platforms can be attack vectors,\u201d Boote added.<\/p>\n<p>After infecting a system, the PowerShell scripts perform system checks to confirm the environment isn\u2019t under analysis, ensure the malware persists after system reboot through the Scheduled Task, and collect detailed system information. Only then is a stable connection attempted with subsequent scripts, where additional modules and instructions are fetched from the attacker\u2019s GitHub repository.<\/p>\n<p>The researchers flagged a GitHub account, \u201cmotoralis\u201d, with consistent activity dating back to 2025, and other less frequent accounts, including \u201cGod0808RAMA,\u201d \u201cPigresy80,\u201d \u201centire73,\u201d \u201cpandora0009,\u201d and \u201cbrandonleeodd93-blip.\u201d<\/p>\n<p>Additionally, the blog post shared a set of URLs and hash functions to support detection efforts.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>DPRK-linked threat actors are preferring stealth over sophistication in targeting South Korean organizations, as researchers report the use of weaponized Windows shortcut (.LNK) files and GitHub-based command-and-control (C2) channels in a new campaign. According to new Fortinet findings, a series of attacks that began in 2024 were found using a multi-stage scripting process and GitHub [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":7708,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-7707","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7707"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7707"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7707\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/7708"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}