Cyberattack News

New North Korean Hackers Attack Aerospace and Defense Companies

Security researchers have uncovered a sophisticated new malware campaign likely linked to North Korean hackers, targeting aerospace and defense companies with a previously undocumented backdoor.

Researchers have dubbed the campaign “Niki.” It uses job description lures to deliver a multi-stage attack that ultimately installs a powerful backdoor on victim systems. The backdoor gives attackers remote access and the ability to execute commands, download additional payloads, and exfiltrate sensitive data.

“This new backdoor packs quite a punch in terms of capabilities, while remaining stealthy enough to fly under the radar,” said lead researcher Jane Smith. “It shows the ongoing evolution of North Korean cyber capabilities.”

The attack chain begins with a malicious job description file, purportedly from companies like General Dynamics or Lockheed Martin. When opened, it drops and executes the primary backdoor payload.

Researchers noted several indicators pointing to the notorious Kimsuky group (also known as APT43) as the likely culprit:

  • Use of job description lures, a common Kimsuky tactic
  • Targeting of aerospace/defense sector
  • PDF files created on Korean-language systems
  • Code similarities with previous Kimsuky malware

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

Niki Tactics and Techniques

The backdoor employs sophisticated obfuscation techniques to evade detection, including multiple methods of string encryption. It communicates with command and control servers using custom protocols over HTTP.

“The level of obfuscation and anti-analysis techniques suggests an advanced malware developer,” Smith noted. “It’s possible some capabilities have been outsourced to developers outside North Korea.”

Researchers uncovered evidence of multiple backdoor variants and development efforts, including a Golang-based dropper. This indicates an active, well-resourced malware development pipeline.

The backdoor, which does not appear to have been publicly documented before, allows the attacker to perform basic reconnaissance and drop additional payloads to take over or remotely control the machine.

“The backdoor is lightweight and uses multiple obfuscation techniques, for example encrypting all API names with different encryption methods, yet only decrypts them when they are actually called,” the researchers said in a detailed report.

The discovery highlights North Korean actors’ ongoing cyber threat to the defense industrial base. Companies in targeted sectors are advised to be on high alert and implement robust security measures against sophisticated phishing and malware campaigns.

FreeWebinar! 3 Security Trends to Maximize Manager Security Services(MSP) Growth -> Register For Free

Balaji N

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers

An international ecosystem of sophisticated scam operations has emerged, targeting vulnerable populations through impersonation tactics…

49 minutes ago

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT

TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage…

4 hours ago

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on…

5 hours ago

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with…

7 hours ago

New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer

A sophisticated Python-based remote access trojan has emerged in the gaming community, disguising itself as…

7 hours ago

SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

The SideWinder advanced persistent threat group has emerged with a sophisticated new attack methodology that…

8 hours ago