<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Velvet Chollima — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/velvet-chollima/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 19 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/velvet-chollima/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kimsuky Malware Using Dropbox API for Command and Control</title><link>https://feed.craftedsignal.io/briefs/2026-03-kimsuky-dropbox-api/</link><pubDate>Thu, 19 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-kimsuky-dropbox-api/</guid><description>Kimsuky is using malware that leverages the Dropbox API for command and control, enabling file exfiltration and remote code execution.</description><content:encoded><![CDATA[<p>Kimsuky, a North Korean APT group, has been observed utilizing malware that leverages the Dropbox API for command and control (C2). This allows the malware to blend in with legitimate network traffic, making detection more challenging. The malware uses the Dropbox API to upload stolen data and download commands from the attackers. This method provides a covert channel for exfiltration and control, bypassing traditional network-based security measures. The group has been known to target South Korean entities, but the scope of targeting may extend beyond this region. This technique has been observed starting in early 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unconfirmed vector, such as spear phishing or watering hole attacks, delivering an initial downloader.</li>
<li>The downloader executes and establishes persistence, potentially by creating scheduled tasks or modifying registry keys.</li>
<li>The malware initializes the Dropbox API, authenticating with stolen or embedded API keys.</li>
<li>The malware enumerates files on the compromised system, targeting documents, credentials, and other sensitive data.</li>
<li>Stolen data is compressed and encrypted before being uploaded to a designated Dropbox folder controlled by the attacker, using the Dropbox API.</li>
<li>The malware periodically checks the attacker&rsquo;s Dropbox folder for new commands, also using the Dropbox API.</li>
<li>Downloaded commands are decrypted and executed on the compromised system, enabling actions such as remote code execution or further data exfiltration.</li>
<li>The cycle of data exfiltration and command execution continues, allowing the attacker to maintain persistent access and control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to significant data breaches, intellectual property theft, and espionage. Kimsuky&rsquo;s targeting of South Korean entities suggests a focus on political and strategic intelligence gathering. The use of Dropbox as a C2 channel allows the attackers to remain undetected for extended periods, maximizing the impact of the compromise. The number of victims is currently unknown, but the potential for widespread compromise is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for unusual API calls to Dropbox, especially from unknown or suspicious processes (see: &ldquo;Detect Suspicious Dropbox API Usage&rdquo; Sigma rule).</li>
<li>Implement strict access controls and monitoring for Dropbox API usage within the organization.</li>
<li>Investigate and block any suspicious processes attempting to access Dropbox API endpoints.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>kimsuky</category><category>dropbox</category><category>api</category><category>command-and-control</category><category>exfiltration</category></item></channel></rss>