Reconshark

Malware updated 6 months ago (2024-05-17T09:17:28.687Z)
Download STIX
Preview STIX
ReconShark is a new malware variant deployed by the North Korea-linked Advanced Persistent Threat (APT) group, Kimsuky. This tool has been observed in an ongoing campaign, used as an infostealer-downloader and is a new iteration of the group's custom BabyShark malware family. The ReconShark tool is delivered through command-and-control sites such as staradvertiser[.]store, which are known to be controlled by Kimsuky. The group typically engages targets in conversation, delivering a spoofed URL to a Google document that redirects to a malicious website designed to capture Google credentials, or a weaponized Office document that executes the ReconShark reconnaissance malware. Kimsuky has also been exploiting recently disclosed ScreenConnect vulnerabilities to deploy ToddlerShark, another new variant of malware overlapping with ReconShark and BabyShark. These tools have been used in various espionage campaigns against government organizations, research centers, think tanks, and universities across North America, Europe, and Asia. Kroll's analysts believe ToddleShark is a new version of Kimsuky's BabyShark and ReconShark backdoors, previously seen targeting similar organizations in the United States, Europe, and Asia. For certain targets who engage with the attackers, Kimsuky sends weaponized password-protected Word documents that deploy a reconnaissance malware payload called ReconShark. This program probes systems for the presence of known security software and collects information about the target's computer, planning for a future attack. The archive was used to deploy the ReconShark reconnaissance tool, marking the first time this malware, identified as a reconnaissance instrument, has been distributed by the attackers.
Description last updated: 2024-05-17T09:15:35.837Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
BabyShark is a possible alias for Reconshark. BabyShark is a malicious software (malware) that has been linked to the North Korean Advanced Persistent Threat (APT) group known as Kimsuky, also referred to as Thallium and Velvet Chollima. This malware, written in Microsoft Visual Basic script, was first identified in November 2018 and was used p
3
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Apt
Reconnaissance
Phishing
State Sponso...
Korean
Screenconnect
Exploit
Sentinelone
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Kimsuky Threat Actor is associated with Reconshark. Kimsuky, also known as Springtail, ARCHIPELAGO, Black Banshee, Thallium, Velvet Chollima, and APT43, is a North Korea-linked Advanced Persistent Threat (APT) group that has been active since it was first spotted by Kaspersky researchers in 2013. The group is notorious for its cyber espionage activitUnspecified
5
Source Document References
Information about the Reconshark Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securityaffairs
6 months ago
CERT-EU
8 months ago
CERT-EU
9 months ago
DARKReading
9 months ago
CERT-EU
9 months ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
Flashpoint
2 years ago
CERT-EU
a year ago
CERT-EU
a year ago
InfoSecurity-magazine
a year ago
CERT-EU
a year ago
CERT-EU
2 years ago
CERT-EU
2 years ago
Securityaffairs
2 years ago