Paige Henley
Published on: August 28, 2025
A major leak of hacking tools believed to come from North Korean cyber actors has been published online, raising serious concerns among security experts. The leak, first revealed in Phrack Magazine, includes exploit guides, system logs, and a stealthy Linux rootkit capable of hiding its presence on infected machines.
Researchers say the tools appear designed for attacks on the South Korean government and private networks. Several techniques match those used by the Kimsuky group, a North Korean hacking team well-known for espionage campaigns.
“This leak not only exposes sensitive operational practices of North Korean attackers but also arms other malicious actors with a ready-made arsenal of attack methodologies,” cybersecurity analysts warned.
Security firm Sandfly Security studied the leaked Linux rootkit and called it unusually stealthy. “This rootkit is capable of concealing backdoor operations, hiding files and processes, and maintaining persistence even in highly monitored environments,” the company explained in a report.
The malware installs itself as a hidden kernel module, often under the name /usr/lib64/tracker-fs. Once active, it disappears from normal system listings, making standard tools like lsmod useless for detection. Sandfly researchers said, “Detection instead requires forensic checks against unusual files or unsigned module warnings.”
The rootkit ensures persistence by planting hidden startup scripts that reload the malware every time the system boots. It also deploys a backdoor that listens for secret “magic packets” and can execute commands, transfer files, set up proxies, and move between compromised machines, all while erasing logs to cover its tracks.
Sandfly concluded the findings with a warning: “The only reliable defense against such implants involves automated forensic hunting, strict monitoring for abnormal kernel activity, and immediate system isolation if compromise is suspected.”
The exposure of these tools is troubling for defenders. It not only confirms the advanced tactics of North Korean cyber groups but also hands those methods to other hackers worldwide.