Kimsuky Malware Using Dropbox API for Command and Control
Kimsuky is using malware that leverages the Dropbox API for command and control, enabling file exfiltration and remote code execution.
Kimsuky, a North Korean APT group, has been observed utilizing malware that leverages the Dropbox API for command and control (C2). This allows the malware to blend in with legitimate network traffic, making detection more challenging. The malware uses the Dropbox API to upload stolen data and download commands from the attackers. This method provides a covert channel for exfiltration and control, bypassing traditional network-based security measures. The group has been known to target South Korean entities, but the scope of targeting may extend beyond this region. This technique has been observed starting in early 2026.
Attack Chain
- Initial access is gained through an unconfirmed vector, such as spear phishing or watering hole attacks, delivering an initial downloader.
- The downloader executes and establishes persistence, potentially by creating scheduled tasks or modifying registry keys.
- The malware initializes the Dropbox API, authenticating with stolen or embedded API keys.
- The malware enumerates files on the compromised system, targeting documents, credentials, and other sensitive data.
- Stolen data is compressed and encrypted before being uploaded to a designated Dropbox folder controlled by the attacker, using the Dropbox API.
- The malware periodically checks the attacker’s Dropbox folder for new commands, also using the Dropbox API.
- Downloaded commands are decrypted and executed on the compromised system, enabling actions such as remote code execution or further data exfiltration.
- The cycle of data exfiltration and command execution continues, allowing the attacker to maintain persistent access and control over the compromised system.
Impact
Successful attacks can lead to significant data breaches, intellectual property theft, and espionage. Kimsuky’s targeting of South Korean entities suggests a focus on political and strategic intelligence gathering. The use of Dropbox as a C2 channel allows the attackers to remain undetected for extended periods, maximizing the impact of the compromise. The number of victims is currently unknown, but the potential for widespread compromise is high.
Recommendation
- Monitor network traffic for unusual API calls to Dropbox, especially from unknown or suspicious processes (see: “Detect Suspicious Dropbox API Usage” Sigma rule).
- Implement strict access controls and monitoring for Dropbox API usage within the organization.
- Investigate and block any suspicious processes attempting to access Dropbox API endpoints.
- Deploy the Sigma rules in this brief to your SIEM and tune for your environment.
Detection coverage 2
Detect Suspicious Dropbox API Usage
highDetects processes making API calls to Dropbox, which could indicate malware using Dropbox for C2.
Detect Process Creating Network Connections to Dropbox API
highDetects a process creation event where the created process then connects to the Dropbox API
Detection queries are kept inside the platform. Get full rules →