To Protect Systems And Networks From Kimsuky's Spionase Engineering, Kaspersky Experts Give This Suggestion

JAKARTA - Kimsuky's active cyber espionage campaign continues to show productive equipment updates and tactics to target entities related to North Korea.

Seongsu Park, Main Security Researcher for the Global Research and Analysis Team (GReAT) at Kaspersky, discovered that Kimsuky is constantly configured command and multi-phase (C2) servers with various commercial hosting services located around the world.

Command and control servers (command and control) are servers that help threat actors control their malware and send malicious commands to their members, set spyware, send payloads, and more.

Park also said that Kimsuky now has 603 malicious command centers with more likely attacks reaching beyond the Korean peninsula.

To protect systems and networks from Kimsuky's clandestine tactics and techniques, Kaspersky experts suggest:

Full context-based defense is key

Cooperation with other industries