North Korean Hackers Turn GitHub into C2 Battlefield with Sneaky LNK Phishing
Forget the usual malware droppers. DPRK hackers are phishing South Korean orgs with LNK files that masquerade as PDFs, then pivot to GitHub for C2. It's a slick architectural shift that's hard to block.
⚡ Key Takeaways
- DPRK hackers chain phishing LNK files to PowerShell and GitHub C2 for stealthy access to South Korean targets. 𝕏
- GitHub's trusted status makes it ideal for evasion—malware pulls commands via repo updates. 𝕏
- Shift to 'dev-native' tactics predicts wider adoption by other nation-states, urging GitHub traffic monitoring. 𝕏
Worth sharing?
Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.
Originally reported by SecurityAffairs