Thursday, August 28, 2025
HomeNewsNorth Korean Hacking Tools Leak Online, Including Advanced Linux Rootkit by Paige...

North Korean Hacking Tools Leak Online, Including Advanced Linux Rootkit by Paige Henley


Paige Henley

Published on: August 28, 2025
Editor

A major leak of hacking tools believed to come from North Korean cyber actors has been published online, raising serious concerns among security experts. The leak, first revealed in Phrack Magazine, includes exploit guides, system logs, and a stealthy Linux rootkit capable of hiding its presence on infected machines.

Researchers say the tools appear designed for attacks on the South Korean government and private networks. Several techniques match those used by the Kimsuky group, a North Korean hacking team well-known for espionage campaigns.

“This leak not only exposes sensitive operational practices of North Korean attackers but also arms other malicious actors with a ready-made arsenal of attack methodologies,” cybersecurity analysts warned.

Security firm Sandfly Security studied the leaked Linux rootkit and called it unusually stealthy. “This rootkit is capable of concealing backdoor operations, hiding files and processes, and maintaining persistence even in highly monitored environments,” the company explained in a report.

The malware installs itself as a hidden kernel module, often under the name /usr/lib64/tracker-fs. Once active, it disappears from normal system listings, making standard tools like lsmod useless for detection. Sandfly researchers said, “Detection instead requires forensic checks against unusual files or unsigned module warnings.”

The rootkit ensures persistence by planting hidden startup scripts that reload the malware every time the system boots. It also deploys a backdoor that listens for secret “magic packets” and can execute commands, transfer files, set up proxies, and move between compromised machines, all while erasing logs to cover its tracks.

Sandfly concluded the findings with a warning: “The only reliable defense against such implants involves automated forensic hunting, strict monitoring for abnormal kernel activity, and immediate system isolation if compromise is suspected.”

The exposure of these tools is troubling for defenders. It not only confirms the advanced tactics of North Korean cyber groups but also hands those methods to other hackers worldwide.

RELATED ARTICLES

Most Popular

Dominic
32244 POSTS0 COMMENTS
Milvus
80 POSTS0 COMMENTS
Nango Kala
6613 POSTS0 COMMENTS
Nicole Veronica
11786 POSTS0 COMMENTS
Nokonwaba Nkukhwana
11831 POSTS0 COMMENTS
Shaida Kate Naidoo
6726 POSTS0 COMMENTS
Ted Musemwa
7008 POSTS0 COMMENTS
Thapelo Manthata
6683 POSTS0 COMMENTS
Umr Jansen
6695 POSTS0 COMMENTS