How the “Kim” dump exposed North Korea's credential theft playbook
Contents: Part I: Technical Analysis Part II: Goals Analysis Part III: Threat Intelligence Report Executive Summary A rare and revealing breach attributed to a North Korean-affiliated actor, known only as “Kim” as named by the hackers who dumped the data, has delivered a new insight into Kimsuky (APT43) tactics, techniques, and infrastructure. This actor’s operational profile showcases credential-focused intrusions targeting South Korean and Taiwanese networks, with a blending of Chinese-la