Kimsuky

GPTKB entity

Statements (55)
Predicate Object
gptkbp:instanceOf cybercrime
gptkbp:activeYearsStart 2012
gptkbp:alsoKnownAs Thallium
Black Banshee
Velvet Chollima
gptkbp:associatedWith North Korean Reconnaissance General Bureau
gptkbp:attributedTo gptkb:United_States_Department_of_Homeland_Security
South Korean National Intelligence Service
gptkbp:connectsTo gptkb:Lazarus_Group
gptkb:APT37
gptkbp:countryOfOrigin gptkb:North_Korea
gptkbp:designation gptkb:Advanced_Persistent_Threat_(APT)
https://www.w3.org/2000/01/rdf-schema#label Kimsuky
gptkbp:language gptkb:Korean
English
gptkbp:method malware
phishing
spear-phishing
watering hole attacks
gptkbp:motive gptkb:intelligence_gathering
espionage
political espionage
gptkbp:notableAttacks 2013 South Korean cyberattacks
COVID-19 themed phishing campaigns
Operation Kimsuky
gptkbp:notableFor targeting journalists
targeting diplomatic officials
targeting human rights organizations
targeting nuclear policy experts
gptkbp:reportsTo gptkb:Microsoft
gptkb:South_Korean_government
gptkb:FireEye
gptkb:Kaspersky_Lab
gptkb:US-CERT
ESTsecurity
gptkbp:target gptkb:Europe
gptkb:Japan
gptkb:South_Korea
gptkb:United_States
gptkb:government_agency
universities
think tanks
defense contractors
gptkbp:usesMalware gptkb:Konni
gptkb:BabyShark
Browser extensions
Keylogger
RATs
AppleSeed
CSPY Downloader
FastViewer
gptkbp:bfsParent gptkb:APT43
gptkb:Red_Star_APT
gptkb:APT37
gptkbp:bfsLayer 8