Apt43

Threat Actor updated 4 months ago (2024-05-04T18:29:19.533Z)
Download STIX
Preview STIX
APT43, also known as Kimsuky, is a North Korean state-sponsored advanced persistent threat (APT) group that has been actively involved in cybercrime and espionage. The group has been implicated in a series of attacks exploiting vulnerabilities, which have drawn the attention of various cybersecurity entities. Ransomware groups such as Black Basta and Bl00dy have also exploited these vulnerabilities, with the latter employing the leaked LockBit ransomware encryptor. However, it's APT43's activities that pose significant concerns, particularly for the U.S. healthcare and public health sector, according to HHS HC3. The Office of Foreign Assets Control (OFAC) of the U.S Department of Treasury has sanctioned APT43 due to its intelligence gathering on behalf of the Democratic People’s Republic of Korea (DPRK). This sanction came in response to the group's involvement in the deployment of a military reconnaissance satellite supporting North Korea's weapons of mass destruction program in November 2023. Despite this, the group continues to demonstrate resilience and sophistication in their operations, employing tactics such as social engineering, spear-phishing, credential harvesting, and spoofed personae. In addition to being a major threat to the global community, APT43 operates under the full backing of the North Korean regime, tasked with gathering sensitive information on a wide range of topics, including nuclear technology, sanctions evasion, and unification efforts. The group's activities have been attributed to the Konni threat actor, sharing striking similarities with the North Korean cluster known as Kimsuky. As a result, the focus on North Korean threat actors has intensified, with organizations like Mandiant highlighting the growing concern around APT43's actions.
Description last updated: 2024-03-29T21:15:44.056Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Kimsuky
3
Kimsuky, also known as Springtail, ARCHIPELAGO, Black Banshee, Thallium, Velvet Chollima, and APT43, is a North Korea-linked threat actor first identified by a Kaspersky researcher in 2013. This cyberespionage group has been associated with various malicious activities, including spear-phishing camp
Thallium
3
Thallium, also known as Kimsuky, Velvet Chollima, and APT43, is a North Korean state-sponsored threat actor or hacking group that has been active since 2012. Tracked by the Cybereason Nocturnus Team and other security researchers, this cyber espionage group is believed to operate on behalf of the No
Emerald Sleet
2
Emerald Sleet, a North Korea-affiliated advanced persistent threat (APT) group, has emerged as a significant cybersecurity concern. The group leverages OpenAI’s ChatGPT, the same technology that underpins Microsoft's Copilot, to enhance its malicious activities. These activities include spear-phishi
Reconnaissance General Bureau Rgb
2
The Reconnaissance General Bureau (RGB) is a North Korean threat actor, responsible for executing actions with malicious intent. It's associated with several hacking groups known within the global cybersecurity industry as Lazarus Group, Bluenoroff, and Andariel, which have been identified as agenci
Lazarus Group
2
The Lazarus Group, a notorious threat actor associated with North Korea, has been implicated in several high-profile cyber attacks and exploitation activities. The group's objective often involves establishing a kernel read/write primitive, which allows them to gain high-level access to systems and
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Apt
State Sponso...
Phishing
Mandiant
Cybercrime
Health
Healthcare
Android
Reconnaissance
Espionage
Korean
Vulnerability
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
APT37Unspecified
2
APT37, also known as ScarCruft, Reaper, or Group123, is a threat actor suspected to be linked to North Korea. It primarily targets South Korea but has also extended its activities to Japan, Vietnam, and the Middle East, focusing on various industry verticals such as chemicals, electronics, manufactu
APT41Unspecified
2
APT41, a threat actor attributed to China, has been actively targeting organizations in at least 14 countries since 2012. The group is known for its use of an extensive range of malware, with at least 46 different code families and tools observed in their operations. They are associated with various
Wicked PandaUnspecified
2
Wicked Panda, also known as APT41, Double Dragon, and Bronze Atlas, is a state-sponsored threat actor originating from China. The Department of Health and Human Services' Health Sector Cybersecurity Coordination Center has identified it as one of the top cyber threats. Over the years, security resea
Double DragonUnspecified
2
Double Dragon, also known as APT41, Winnti, or Barium, is a prominent Advanced Persistent Threat (APT) group believed to have originated from China. As a threat actor, Double Dragon represents a human entity with the intent to execute actions of a malicious nature. The group has been identified by t
RgbUnspecified
2
RGB is a threat actor group associated with North Korea's Reconnaissance General Bureau (RGB), which has been involved in numerous cyber espionage activities. The RGB 3rd Bureau, based in Pyongyang and Sinuiju, includes state-sponsored cyber groups known as Andariel, Onyx Sleet (formerly PLUTONIUM),
Source Document References
Information about the Apt43 Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
BankInfoSecurity
5 months ago
Feds Warn of Credential Harvesting Threats in Healthcare
CERT-EU
6 months ago
GRIT Ransomware Report: February 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
DARKReading
6 months ago
North Korea Hits ScreenConnect Bugs to Drop 'ToddleShark' Malware
CERT-EU
9 months ago
U.S. Treasury Sanctions Eight Foreign-Based Agents and North Korean Kimsuky Attackers
CERT-EU
9 months ago
Over $3M worth of crypto amassed by North Korean hackers
CERT-EU
9 months ago
Konni Malware Alert: Uncovering The Russian-Language Threat
DARKReading
9 months ago
North Korea APT Slapped With Cyber Sanctions After Satellite Launch
CERT-EU
9 months ago
Kimsuky hacking group faces US sanctions
CERT-EU
9 months ago
U.S. government sanctions prolific North Korean cyber espionage unit
CERT-EU
a year ago
Chinese, North Korean Nation-State Groups Target Health Data
CERT-EU
a year ago
Lazarus Group Targeting Defense Experts with Fake Interviews via Trojanized VNC Apps
CERT-EU
a year ago
Microsoft Warns of North Korean Attacks Exploiting JetBrains TeamCity Flaw
CERT-EU
a year ago
North Korean defectors' group leader attacked by state-backed hackers
CERT-EU
a year ago
North Korean Hackers Continue to Refine Their Arsenal of Tactics & Techniques
CERT-EU
a year ago
North Korean and Chinese Hackers Attacking Healthcare Industries
BankInfoSecurity
a year ago
Chinese, North Korean Nation-State Groups Target Health Data
CERT-EU
a year ago
US-Based North Korea Expert Exposes How Pyongyang Hackers Impersonated Her Six Years Ago | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
a year ago
Google sheds light on APT43 subgroup’s techniques
Checkpoint
a year ago
Chain Reaction: ROKRAT’s Missing Link - Check Point Research
CERT-EU
a year ago
Anomali Cyber Watch: Two Supply-Chain Attacks Chained Together, Decoy Dog Stealthy DNS Communication, EvilExtractor Exfiltrates to FTP Server