🇰🇵

Kimsuky

High ConfidenceHigh Threat

Velvet Chollima • Thallium • Black Banshee • Emerald Sleet • TA406 • APT43

Kimsuky is a North Korean state-sponsored advanced persistent threat (APT) group that has been active since at least 2012. The group is also known as Thallium, Velvet Chollima, and APT43. Kimsuky is primarily engaged in cyber espionage, with a focus on gathering intelligence on foreign policy, national security, and other matters of strategic interest to the North Korean government. The group's primary targets are located in South Korea, Japan, and the United States, and include government agencies, think tanks, research institutions, and individuals with expertise in areas relevant to North Korea's interests. Kimsuky is known for its use of social engineering and spearphishing to gain initial access to target networks. The group often tailors its phishing campaigns to the specific interests of its targets, using lures related to topics such as the North Korean nuclear program, international relations, and public policy. Once inside a network, Kimsuky employs a variety of custom malware and tools to exfiltrate data and maintain persistence. The group has demonstrated a consistent ability to evolve its tactics and techniques to evade detection and maintain its operational effectiveness. Over the years, Kimsuky has been responsible for a number of high-profile cyber espionage campaigns, including attacks against the Korea Hydro & Nuclear Power Co., Ltd. in 2014, and Operatio...

Origin: North Korea
Sponsor: RGB (Reconnaissance General Bureau)
Active: 2012 - Present
Victims: 300+ organizations
Advanced
Active
EspionageIntelligence Collection
Risk Assessment
79
Composite Risk Score
High Risk
ARCS Compliance82
Escalation Risk78
Grievance Index85
Infrastructure Impact70
History & Evolution

Kimsuky is a North Korean state-sponsored advanced persistent threat (APT) group that has been active since at least 2012. The group is also known as Thallium, Velvet Chollima, and APT43. Kimsuky is primarily engaged in cyber espionage, with a focus on gathering intelligence on foreign policy, national security, and other matters of strategic interest to the North Korean government. The group's primary targets are located in South Korea, Japan, and the United States, and include government agencies, think tanks, research institutions, and individuals with expertise in areas relevant to North Korea's interests. Kimsuky is known for its use of social engineering and spearphishing to gain initial access to target networks. The group often tailors its phishing campaigns to the specific interests of its targets, using lures related to topics such as the North Korean nuclear program, international relations, and public policy. Once inside a network, Kimsuky employs a variety of custom malware and tools to exfiltrate data and maintain persistence. The group has demonstrated a consistent ability to evolve its tactics and techniques to evade detection and maintain its operational effectiveness. Over the years, Kimsuky has been responsible for a number of high-profile cyber espionage campaigns, including attacks against the Korea Hydro & Nuclear Power Co., Ltd. in 2014, and Operatio...

Targeting

Target Sectors

GovernmentThink TanksAcademiaDefenseNuclear IndustryMedia

Target Regions

South KoreaUnited StatesJapanEurope
Attribution & Affiliations

Attributed to RGB (Reconnaissance General Bureau) (North Korea). Attribution confidence: High.

Intelligence Assessment
High
Threat Level
Moderately
Targeting
Moderately
Adaptability
High
Persistence
Continuous
Op Tempo
Active
Status

Future Outlook

Kimsuky is expected to continue operations targeting Government sectors.

Timeline of Key Events
2012
Major

First observed activity of Kimsuky

2024
Moderate

Continued active operations