Kimsuky now uses multi-stage LNK attacks to install Python backdoors on Windows systems


A North Korean threat group known as Kimsuky has changed how it delivers malware through malicious Windows shortcut files. The latest campaign still ends with a Python-based backdoor, but it now uses more steps in the middle to make detection harder and give the attackers more control over the infection chain.

The campaign starts with LNK files disguised as normal documents. ASEC said examples included filenames such as “Resume (Sungmin Park).hwp.lnk” and “Guide to Establishing Data Backup and Recovery Procedures (Reference).lnk,” which aim to trick users into launching the shortcut.

Once opened, the LNK file runs hidden PowerShell and begins a staged infection flow. According to ASEC, the newer chain now moves through XML, VBS, PS1, and BAT components before it drops the final payload, replacing the shorter LNK-to-PowerShell-to-BAT flow seen before.

How the infection works

ASEC said the first visible trick involves a decoy file that helps hide the malicious activity from the victim. In the background, the malware creates a hidden folder at C:\windirr and stores several components there for the next stages of execution.

The attackers then register a scheduled task designed to keep the malware running. ASEC identified a task named GoogleUpdateTaskMachineCGI__{56C6A980-91A1-4DB2-9812-5158E7E97388} that runs every 17 minutes, helping the threat remain persistent after reboot.

Normal Decoy File (Source – ASEC)

From there, the PowerShell script gathers system details such as the username, running processes, operating system version, public IP address, and antivirus information. ASEC said the data is sent through Dropbox, which lets the attackers blend malicious traffic into a legitimate cloud service.

What the final payload does

After profiling the victim system, the malware downloads a BAT file that fetches ZIP fragments from remote servers, combines them, and extracts the final payload into C:\winii. ASEC said the archive contains a Python backdoor named beauty.py, which is then launched through another scheduled task called GoogleExtension.

Part of the pp.ps1 Code (Source – ASEC)

The backdoor reportedly connects to command-and-control infrastructure on port 8080 and sends a “HAPPY” packet to signal that the infection succeeded. After that, the operator can issue commands remotely.

That level of access gives the attacker a strong foothold. The backdoor can run shell commands, move through directories, upload and download files, delete data, and launch other programs, which makes it useful for espionage and long-term monitoring.

Part of the hh.bat Code (Source – ASEC)

Why this campaign matters

This campaign stands out because Kimsuky did not change the final goal, but it changed the path to get there. By inserting extra layers between the first click and the final payload, the attackers raise the chance that at least part of the chain slips past security controls.

The campaign also fits Kimsuky’s broader pattern. U.S. and South Korean authorities have linked the group to spear-phishing, credential theft, and malware campaigns that target government, policy, research, and private-sector entities, especially in South Korea.

For defenders, the practical takeaway is simple. A shortcut file that looks like a harmless document can still open the door to a full remote access backdoor, especially when it launches several built-in Windows scripting layers in sequence.

Campaign indicators at a glance

ItemDetails
Threat actorKimsuky
Initial lureMalicious .lnk files disguised as documents
Updated execution chainLNK → PowerShell → XML → VBS → PS1 → BAT → Python payload
Hidden folderC:\windirr
PersistenceScheduled task running every 17 minutes
Final payload locationC:\winii
Backdoor namebeauty.py
Reported C2 behaviorConnects to server on port 8080 and sends “HAPPY” packet
Data theft channelDropbox

Source basis: ASEC campaign analysis.

What organizations should do

  • Block or heavily restrict LNK files delivered through email and messaging platforms where possible.
  • Watch for suspicious scheduled tasks, especially ones that imitate Google update activity.
  • Hunt for unusual folders such as C:\windirr and C:\winii on Windows endpoints tied to suspicious user activity.
  • Monitor PowerShell, VBS, BAT, and Task Scheduler events together instead of checking each one in isolation. This chain-based view helps catch staged infections earlier. This is an inference based on ASEC’s described execution flow.
  • Review outbound connections to cloud services if they appear in suspicious script activity, since ASEC observed Dropbox used in the chain.

FAQ

What is Kimsuky using in this campaign?

Kimsuky is using malicious Windows LNK files disguised as ordinary documents to start a multi-stage infection that ends with a Python-based backdoor.

Why is this version harder to detect?

ASEC said the attackers added more intermediate steps, including XML, VBS, PS1, and BAT files, before they deploy the final payload. That gives defenders more moving parts to inspect, but it also gives the attackers more places to hide.

What does the backdoor let attackers do?

The reported backdoor can execute shell commands, browse directories, upload and download files, delete files, and run other programs on the infected machine.

Who does Kimsuky usually target?

Public reporting and prior research commonly associate Kimsuky with campaigns targeting South Korean government, business, research, and policy-related organizations, though targeting can extend beyond those groups.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages