North Korean Kimsuky Hackers Exposed in Alleged Data Breach

Exclusive details have emerged about a daring cyber attack on the notorious North Korean state-sponsored hacking group, Kimsuky. The group's alleged data breach has left security experts stunned, as two hackers, self-describing as the antithesis of Kimsuky's values, have stolen their sensitive information and made it publicly available online.

The two hackers, identified by their pseudonyms 'Saber' and 'cyb0rg,' took to a popular hacking forum, Phrack, to express their grievances against Kimsuky. In a scathing critique, they accused the group of "hacking for all the wrong reasons," citing political agendas and regime orders as the primary motivations behind their actions.

"Kimsuky, you are not a hacker. You are driven by financial greed, to enrich your leaders, and to fulfill their political agenda," reads the hackers' address to Kimsuky published in the latest issue of Phrack. "You steal from others and favour your own. You value yourself above the others: You are morally perverted."

The hackers dumped a substantial portion of Kimsuky's backend, exposing both their tooling and some of their stolen data that could provide valuable insight into unknown campaigns and undocumented compromises.

The 8.9GB Data Dump

The hackers made the entire dump available on the 'Distributed Denial of Secrets' website, which contains various pieces of sensitive information, including:

  • Tools used by Kimsuky for their hacking operations
  • Stolen data from other organizations and individuals
  • Unknown campaigns and undocumented compromises

The hackers note that some of the above information is already known or previously documented, but the dump provides a new dimension to the data, exposing interlinking between Kimsuky's tools and activities.

Impact on Kimsuky Operations

While the breach may not have long-term impact on Kimsuky's operations, it could lead to operational difficulties for the group and disruptions to ongoing campaigns. The stolen data may also be used by other malicious actors to further their own agendas.

A Call to Action

BleepingComputer has reached out to various security researchers to confirm the veracity of the leaked documents and its value, and will update this story as more information becomes available.

Related Stories

  • Picus Blue Report 2025: A Comprehensive Look at Password Cracking Trends
  • Microsoft Leaks Apple Intelligence Data Due to Sploitlight Flaw in macOS
  • Tea App Leak Worsens with Second Database Exposing User Chats
  • Naval Group Investigates 1TB Data Breach
  • Woman Gets 8 Years for Aiding North Koreans Infiltrate 300 US Firms

This is a developing story, and we will continue to provide updates as more information becomes available.