Kimsuky Expands RDP Wrapper & Proxy Malware in Spear-Phishing Attacks

Red | Attack Report
Download PDF

The Kimsuky group continues spear-phishing attacks using malicious LNK files to install PebbleDash and a custom RDP Wrapper for remote control. They also deploy proxy malware, keyloggers, and credential stealers, refining techniques to evade detection. New loaders and injectors enhance stealth, leveraging ReflectiveLoader PowerShell scripts for in-memory execution. Their evolving tactics emphasize remote access over traditional backdoors, targeting South Korean users.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs