North Korean Hackers Target Drug Companies With Fake Excel Files and Dropbox-Based Malware


North Korean hackers linked to the Kimsuky group are targeting pharmaceutical companies with a fake Excel-themed file that secretly launches malware on Windows systems.

The attack uses a Windows shortcut file named White Life Science ERP Specification.lnk. It appears to be a business spreadsheet, but it contains multiple hidden payloads that run through PowerShell, JavaScript, and Windows Task Scheduler. The goal is to gain silent access to the victim’s machine and collect system information from the infected environment.

The campaign matters because pharmaceutical companies hold sensitive research, intellectual property, patient-related information, manufacturing data, and regulatory documents. A successful compromise could help attackers steal confidential material or maintain long-term access inside a high-value network.

How the fake Excel attack works

The file name is designed to look routine for a life sciences or pharmaceutical employee. A document called “White Life Science ERP Specification” could easily pass as an internal planning file, vendor document, or system specification.

In reality, the .lnk file acts as a container. Researchers found that it holds a decoy Excel document, a PowerShell script, a JavaScript launcher, and a Task Scheduler XML file inside a single shortcut file.

Once the victim opens it, Windows runs a hidden command chain. The infection path moves from LNK to XML to JavaScript to PowerShell, which makes the attack harder to catch at one clear point.

Why the campaign is tied to Kimsuky

Kimsuky is a North Korea-linked cyber espionage group that has operated since at least 2012. MITRE says the group first focused on South Korean government targets, think tanks, and experts, then expanded its activity across government, education, business services, manufacturing, and international organizations.

The use of malicious LNK files, PowerShell, scheduled tasks, hidden folders, and cloud services also matches recent Kimsuky tradecraft. SOC Prime reported earlier in April 2026 that Kimsuky campaigns used malicious LNK attachments, PowerShell, XML task definitions, VBS or PS1 scripting, and Dropbox-linked activity.

This latest pharmaceutical-themed campaign shows how the group continues to adapt its lures to high-value industries. Drug companies are attractive targets because they combine research value with complex supply chains and heavy document exchange.

Key details from the campaign

DetailInformation
Threat groupKimsuky
Country linkNorth Korea
Target sectorPharmaceutical and life sciences companies
Lure fileWhite Life Science ERP Specification.lnk
File typeWindows shortcut disguised as an Excel document
Main tools usedPowerShell, JavaScript, Windows Task Scheduler
Persistence methodScheduled task impersonating a browser update
Data channelDropbox API
Main riskEspionage, system profiling, remote command execution

The fake document does not need a complex exploit to work. It relies on user execution, file disguise, and Windows scripting features that already exist on most systems.

Inside the payload and persistence chain

The shortcut runs cmd.exe, which launches PowerShell through the SysWOW64 path. This starts the 32-bit PowerShell process on a 64-bit Windows machine.

PowerShell Code Included in Malware (Source – Wezard4u)

Attackers often use this approach because some security tools focus more heavily on 64-bit process paths. It can also help the malware blend into older compatibility workflows.

The PowerShell script decrypts embedded components using XOR encoding and drops them into a hidden folder named C:\sysconfigs. That folder name looks close to a real Windows system directory, which may reduce suspicion during a quick manual review.

How the malware keeps access

The campaign creates a scheduled task named Avast Secure Browser VPS Differential Update Ex. That name makes the persistence look like a normal browser update job.

The task launches a JavaScript file named copa08o.js, which then helps run the main PowerShell payload named opakib.ps1.

Once active, the PowerShell payload connects to Dropbox through its API. It collects details such as the victim’s domain name, username, operating system version, public IP address, and running processes. It then encodes the data before uploading it to Dropbox.

Why Dropbox abuse is effective

Cloud service abuse gives attackers a practical advantage. Many companies allow Dropbox, GitHub, Google Drive, Microsoft services, or similar platforms because employees use them for legitimate work.

That creates a visibility problem. Security tools may see traffic going to a known cloud provider rather than an obvious attacker-controlled server.

Kimsuky and related North Korean activity have used cloud services before. Fortinet reported in April 2026 that DPRK-linked campaigns used GitHub as command-and-control infrastructure, while SOC Prime described Dropbox abuse in related Kimsuky LNK campaigns.

File indicators reported in the campaign

Indicator typeValue
File nameWhite Life Science ERP Specification.lnk
MD55c3bf036ab8aadddb2428d27f3917b86
SHA-1e9c16aa2e322a65fc2621679ca8e7414ebcf89c0
SHA-256d4c184f4389d710c8aefe296486d4d3e430da609d86fa6289a8cea9fde4a1166
Dropped folderC:\sysconfigs
PowerShell payloadopakib.ps1
JavaScript launchercopa08o.js
Scheduled task nameAvast Secure Browser VPS Differential Update Ex

Security teams should add these indicators to endpoint detection, SIEM, and threat-hunting workflows. They should also search for suspicious scheduled tasks that impersonate security tools or browser update processes.

What pharmaceutical companies should do now

Drug companies should treat this campaign as an espionage risk, not just a routine malware alert. The lure targets business workflows, and the payload focuses on stealth, persistence, and system profiling.

IT teams should make Windows show file extensions by default. This simple change helps users see when a supposed spreadsheet ends in .lnk.

Avast Security Browser Impersonation Task Scheduler (Source – Wezard4u)

Security teams should also restrict unnecessary PowerShell execution, especially from shortcut files, temporary folders, and unusual SysWOW64 paths.

Recommended actions:

  • Enable Windows file extension visibility for all users.
  • Block or quarantine .lnk files delivered through email.
  • Monitor PowerShell launched from SysWOW64.
  • Hunt for the C:\sysconfigs folder.
  • Review scheduled tasks with names that imitate browser or security updates.
  • Monitor Dropbox API traffic from systems that do not need Dropbox.
  • Add the reported hashes to endpoint detection tools.
  • Use application control to restrict script execution.
  • Train staff to report unexpected ERP, specification, or vendor documents.
  • Isolate any machine that opened the suspicious shortcut file.

Why this is a serious supply chain concern

Pharmaceutical companies work with suppliers, regulators, consultants, laboratories, hospitals, and software providers. That constant document exchange gives attackers many opportunities to disguise malware as ordinary business material.

A fake ERP specification can look believable in this environment. Employees may expect spreadsheets, project files, requirements documents, and system templates from vendors or internal teams.

This makes prevention harder. Companies need technical controls that stop disguised shortcut files before a user has to make the final decision.

FAQ

What is the main threat in this campaign?

The main threat is a malicious Windows shortcut file disguised as an Excel document. It launches scripts that create persistence and connect to Dropbox for data exchange.

Who is behind the campaign?

The campaign has been attributed to Kimsuky, a North Korea-linked cyber espionage group.

What companies are being targeted?

The campaign targets pharmaceutical and life sciences companies, especially organizations that may handle sensitive research, manufacturing, or drug-related data.

Does the file use a real Excel exploit?

The report describes a Windows shortcut file disguised as an Excel document. The attack relies on user execution and scripted payload delivery rather than a traditional Excel vulnerability.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages