PROBABLYPWNED
Threat IntelligenceApril 3, 20264 min read

North Korea Uses GitHub as C2 in South Korea Attacks

FortiGuard Labs exposes DPRK campaign using LNK files and GitHub repositories for command-and-control against South Korean targets. 22 evasion techniques identified.

Alex Kowalski

North Korean threat actors are weaponizing GitHub's trusted reputation to run command-and-control operations against South Korean organizations. FortiGuard Labs published detailed analysis yesterday revealing an evolved LNK-based attack chain that abuses GitHub for payload delivery and data exfiltration.

Campaign Overview

The campaign targets South Korean companies across multiple sectors using malicious LNK (shortcut) files. When victims open what appears to be a Hangul document—a Korean word processor format commonly used in business—the LNK executes embedded scripts that establish persistence and begin reconnaissance.

What makes this campaign notable is the C2 infrastructure. Rather than using dedicated servers that security teams can block, the attackers leverage GitHub's API for both receiving commands and exfiltrating stolen data. Blocking GitHub isn't realistic for most organizations, making detection significantly harder.

FortiGuard attributes the campaign to North Korea-affiliated groups based on metadata patterns consistent with known DPRK actors like Kimsuky, APT37, and Lazarus. Earlier, less-obfuscated variants contained identifying information that threat actors subsequently removed as they improved operational security.

Attack Chain Breakdown

The infection begins with a crafted LNK file disguised as legitimate business documents. FortiGuard identified several decoy themes:

  • TRAMS WINBOT AI Strategic Proposal
  • Strategic Partnership Detailed Proposal (Korean)
  • Future Asset X AYC Fund Proposal
  • IOTRUST Confidential Offer
  • AIN x Mine Korea 2026

When opened, the LNK doesn't launch the expected document editor. Instead, it executes a function that accepts three parameters: location, length, and XOR key. This decodes both a decoy PDF (so victims see something plausible) and the malicious PowerShell script that runs silently in the background.

Recent variants embed XOR decoding functions directly within LNK arguments, with encoded payloads inside the files themselves. This evolution shows the attackers actively refining their techniques to evade security tools.

Anti-Analysis and Evasion

The PowerShell component implements extensive anti-analysis checks, monitoring for over 30 processes including:

  • Virtual machine tools (vmxnet, vboxservice)
  • Debuggers (x64dbg, OllyDbg)
  • Forensic utilities (Wireshark, Procmon)

If any analysis tools are detected, execution terminates immediately. This makes dynamic analysis in sandbox environments difficult without specific countermeasures.

The malware establishes persistence through a scheduled task named "Technical Paper for Creata Chain Task..." that executes a hidden VBScript every 30 minutes. The naming convention attempts to blend with legitimate scheduled tasks on business systems.

GitHub Infrastructure Abuse

The primary C2 endpoint uses GitHub's raw content delivery: hxxps://raw[.]githubusercontent[.]com/motoralis/singled/main/kcca/paper[.]jim

Data exfiltration goes through GitHub's API using a hardcoded token. Reconnaissance data—including OS version, build number, last boot time, and running processes—uploads to private repositories controlled by the attackers.

FortiGuard documented consistent activity from the "motoralis" account dating back to 2025, with backup accounts including God0808RAMA, Pigresy80, entire73, pandora0009, and brandonleeodd93-blip. Private repositories conceal payloads while leveraging GitHub's reputation to bypass network security controls.

This technique has parallels with other supply chain attacks we've documented, including the recent Axios npm hijack that used legitimate infrastructure to distribute malware.

Attribution and Context

North Korean cyber operations have accelerated throughout 2025-2026, targeting financial institutions, cryptocurrency exchanges, and strategic industries. The DPRK's need for foreign currency—constrained by international sanctions—drives much of this activity.

South Korea remains a primary target for obvious geopolitical reasons, but these techniques appear in campaigns worldwide. Organizations in finance, defense, and technology sectors face elevated risk from DPRK-affiliated groups regardless of geography.

For deeper context on North Korean cyber operations, our recommended cybersecurity reading includes detailed coverage of Lazarus Group's evolution from the Sony hack to modern financial theft operations.

Indicators of Compromise

FortiGuard released file hashes for identified samples:

  • af0309aa38d067373c54b2a7774a32f68ab72cb2dbf5aed74ac784b079830184
  • 9c3f2bd300ad2ef8584cc48adc47aab61bf85fc653d923e106c73fc6ec3ea1dc
  • f20fde3a9381c22034f7ecd4fef2396a85c05bfd54f7db3ad6bcd00c9e09d421
  • 484a16d779d67c7339125ceac10b9abf1aa47f561f40058789bfe2acda548282
  • c0866bb72c7a12a0288f434e16ba14eeaa35d3c4cff4a86046c553c15679c0b5

FortiGuard's detection identifies the malware as LNK/Agent.ALN!tr.

Defensive Recommendations

  1. Block known GitHub accounts - Add the identified usernames to threat intelligence feeds
  2. Monitor GitHub API traffic - Unusual patterns of repository access may indicate C2 activity
  3. Restrict LNK execution - Consider policies that prevent shortcut files from running scripts
  4. Train users on Hangul documents - Korean-language organizations should educate staff about LNK-based phishing
  5. Review scheduled tasks - Audit for suspicious task names, especially those running PowerShell or VBScript

Organizations already dealing with social engineering threats should incorporate these DPRK techniques into security awareness training. The attackers specifically craft lures that match legitimate business communications.

Why This Matters

GitHub abuse isn't new, but this campaign demonstrates sophisticated evolution of the technique. The combination of obfuscated payloads, extensive anti-analysis checks, and infrastructure that blends with legitimate developer traffic makes detection challenging.

North Korean threat actors have shown they'll adapt to defensive measures. Security teams tracking nation-state activity should expect continued innovation in abusing trusted platforms for malicious purposes.

Related Articles