North Korean Hackers Kimsuky Deployed Malware Targeting Crypto Firms: Kaspersky
Sujha has been recognised as 🟣 Women In Crypto 2024 🟣 by BeInCrypto for her leadership in crypto journalism.
- Footballer David Beckham-Backed Healthcare Firm Will no Longer Buy Bitcoin
- Japan’s Crypto Tax Cut to 20% Takes Shape, But Applies to Only ‘Specific’ Digital Assets
- China’s PBOC Issues ‘Action Plan’ to Strengthen Digital Yuan Starting January 2026
- Russia, US Discuss Bitcoin Mining at Zaporizhzhia Nuclear Power Plant, Sidelines Ukraine
- Trust Wallet Browser Extension Compromised, Drains Over $6M User Funds

North Korea’s notorious Kimsuky hacking group, also known as APT43, has been reportedly launching cyberattacks on two South Korean crypto firms using a previously undocumented Golang-based malware named – Durian.
Per findings from cybersecurity solutions giant Kaspersky, Durian is characterized by its “comprehensive backdoor functionality.” This feature enables the execution of delivered commands, additional file downloads and exfiltration of files.
The attacks reportedly took place between August and November 2023, involving a South Korean software exploit to gain initial access.
“Based on our telemetry, we pinpointed two victims within the South Korean cryptocurrency sector. The first compromise occurred in August 2023, followed by a second in November 2023.”
Once the malware is established and operational on the victim’s systems, Durian deployed additional tools, including Kimsuky’s backdoor AppleSeed, and a custom proxy tool named LazyLoad.
Interestingly, LazyLoad tool links to Andariel, a sub-group within the notorious Lazarus. This also raises the suspicion of shared tactics among both North Korean threat groups, the Hacker News reported.
Per reports, Kimsuky started at least 2012 and is under the North Korea’s Reconnaissance General Bureau (RGB), the country’s military intelligence agency.
Kimsuky’s Mail Mafia
Kimsuky group is well-known to have conducted various phishing attacks via email to steal cryptos.
In December 2023, the treat group disguised as South Korean government agency reps and journalists to steal cryptocurrencies. A total of 1,468 people fell victim to the crypto hackers between March and October 2023, according to police reports.
Some of the victims also included retired government officials from diplomacy, military and national security. The perpetrators reportedly sent legit-looking phishing mails to execute the dubious act.
The state-backed hacking group had previously targeted Russian aerospace defense companies “taking advantage of the coronavirus pandemic.”
According to Kommersant report, RT-Inform, the IT security arm of the Russian state-owned tech agency Rostec, noted that there has been an increase in the number of cyberattacks on the IT network during pandemic from April to September 2020. However, it neither denied nor confirmed the Kimsuky attack reports.
- [LIVE] Fed Payments Innovation Conference: Real-Time Updates as Federal Reserve Discusses Crypto, Stablecoins, and AI with Industry Leaders
- Crypto Market Prospect: After the Washout, the Soil Looks Richer
- Gemini AI Predicts the Price of XRP, ETH, and BNB For the Beginning of 2026
- XRP ETPs Absorb $70M as Institutions Rotate Out of Bitcoin
- XRP Price Prediction: Franklin Templeton Exec Says XRP Is Key to Cross-Border Payments – Is a $3 Breakout Next?
About Us
2M+
250+
8
70
Market Overview
- 7d
- 1m
- 1y
- [LIVE] Fed Payments Innovation Conference: Real-Time Updates as Federal Reserve Discusses Crypto, Stablecoins, and AI with Industry Leaders
- Crypto Market Prospect: After the Washout, the Soil Looks Richer
- Gemini AI Predicts the Price of XRP, ETH, and BNB For the Beginning of 2026
- XRP ETPs Absorb $70M as Institutions Rotate Out of Bitcoin
- XRP Price Prediction: Franklin Templeton Exec Says XRP Is Key to Cross-Border Payments – Is a $3 Breakout Next?
More Articles
Get dialed in every Tuesday & Friday with quick updates on the world of crypto