• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
kimsuky's new golang stealer 'troll' and 'gobear' backdoor target south

Kimsuky’s New Golang Stealer ‘Troll’ and ‘GoBear’ Backdoor Target South Korea

You are here: Home / General Cyber Security News / Kimsuky’s New Golang Stealer ‘Troll’ and ‘GoBear’ Backdoor Target South Korea
February 8, 2024

The North Korea-joined country-state actor identified as Kimsuky is suspected of making use of a formerly undocumented Golang-dependent info stealer known as Troll Stealer.

The malware steals “SSH, FileZilla, C push information/directories, browsers, procedure facts, [and] display captures” from contaminated systems, South Korean cybersecurity business S2W said in a new technological report.

Troll Stealer’s links to Kimsuky stem from its similarities to acknowledged malware people, such as AppleSeed and AlphaSeed malware that have been attributed to the team.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

Kimsuky, also tracked beneath the names APT43, ARCHIPELAGO, Black Banshee, Emerald Sleet (earlier Thallium), Nickel Kimball, and Velvet Chollima, is well identified for its propensity to steal delicate, private details in offensive cyber operations.

In late November 2023, the threat actors had been sanctioned by the U.S. Treasury Department’s Place of work of Overseas Property Command (OFAC) for gathering intelligence to additional North Korea’s strategic objectives.

The adversarial collective, in latest months, has been attributed to spear-phishing attacks focusing on South Korean entities to deliver a selection of backdoors, like AppleSeed and AlphaSeed.

Golang Stealer

S2W’s hottest examination reveals the use of a dropper that masquerades as a security plan installation file from a South Korean business named SGA Solutions to launch the stealer, which will get its name from the route “D:/~/repo/golang/src/root.go/s/troll/agent” which is embedded in it.

“The dropper runs as a legit installer alongside the malware, and the two the dropper and malware are signed with a legitimate, authentic D2Innovation Co.,LTD’ certification, suggesting that the company’s certification was actually stolen,” the company reported.

A stand-out aspect of Troll Stealer is its means to pilfer the GPKI folder on contaminated techniques, elevating the probability that the malware has been put to use in attacks focusing on administrative and public companies in the nation.

Cybersecurity

Provided the absence of Kimsuky campaigns documenting the theft of GPKI folders, it has elevated the chance that the new actions is possibly a shift in methods or the perform of an additional risk actor intently associated with the group that also has obtain to the source code of AppleSeed and AlphaSeed.

There are also symptoms that the threat actor may well be associated with a Go-based mostly backdoor codenamed GoBear which is also signed with a authentic certificate associated with D2Innovation Co., LTD and executes guidance acquired from a command-and-manage (C2) server.

“The strings contained in the names of the functions it calls have been discovered to overlap with the instructions used by BetaSeed, a C++-centered backdoor malware applied by the Kimsuky team,” S2W reported. “It is noteworthy that GoBear provides SOCKS5 proxy functionality, which was not previously supported by the Kimsuky group’s backdoor malware.”

Found this report fascinating? Comply with us on Twitter  and LinkedIn to study extra exclusive written content we publish.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «critical patches released for new flaws in cisco, fortinet, vmware Critical Patches Released for New Flaws in Cisco, Fortinet, VMware Products
Next Post: Google Starts Blocking Sideloading of Potentially Dangerous Android Apps in Singapore google starts blocking sideloading of potentially dangerous android apps in»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.