<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Network_activity — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/network_activity/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 22:12:32 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/network_activity/feed.xml" rel="self" type="application/rss+xml"/><item><title>Maltrail IOCs for APT Kimsuky, Lummac2, MagentoCore, and FakeApp Campaigns</title><link>https://feed.craftedsignal.io/briefs/2026-05-maltrail-iocs/</link><pubDate>Wed, 20 May 2026 22:12:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-maltrail-iocs/</guid><description>This brief summarizes indicators of compromise (IOCs) from a Maltrail feed update on 2026-05-20, detailing network activity associated with APT Kimsuky, Lummac2, MagentoCore, and FakeApp campaigns, providing actionable intelligence for detection and response.</description><content:encoded><![CDATA[<p>This threat brief is based on a Maltrail feed update from 2026-05-20 which identifies network IOCs associated with multiple threat actors and campaigns. The identified actors include APT Kimsuky, a suspected North Korean threat group known for espionage and cybercrime, along with campaigns attributed to Lummac2, MagentoCore, and FakeApp. The IOCs consist primarily of domains that are likely used for command and control, phishing, or malware distribution. This information is relevant for defenders seeking to identify and block malicious network traffic related to these campaigns. The domains associated with FakeApp suggest potential phishing or social engineering campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> The attack chain likely starts with phishing emails or social engineering tactics to lure victims to visit malicious websites.</li>
<li><strong>Domain Resolution:</strong> Victims click on links within phishing emails, resolving malicious domains (e.g., <code>duolivecall-googel.com</code>) associated with the campaigns.</li>
<li><strong>Payload Delivery:</strong> Upon visiting the malicious domain, the victim may be prompted to download a malicious application or document containing malware.</li>
<li><strong>Command and Control (C2) Communication:</strong> The malware establishes communication with command and control servers using domains such as <code>2u9f.2usrmmwwduz.dns.navy</code> (for APT Kimsuky) or <code>pantofr.cyou</code> (for Lummac2) to receive instructions.</li>
<li><strong>Data Exfiltration:</strong> The compromised system begins exfiltrating sensitive data to attacker-controlled infrastructure.</li>
<li><strong>Lateral Movement:</strong> Depending on the malware and the actor&rsquo;s objectives, lateral movement may occur to compromise additional systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks leveraging these IOCs could result in data theft, system compromise, espionage, or financial loss. Victims may include individuals targeted by FakeApp scams, or organizations compromised by APT Kimsuky for espionage purposes. The MagentoCore campaign suggests potential targeting of e-commerce platforms for financial gain through skimming or data theft.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block the domains listed in the IOC table at the DNS resolver to prevent communication with malicious infrastructure.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Monitor network traffic for connections to the domains associated with APT Kimsuky, Lummac2, MagentoCore, and FakeApp.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>ioc</category><category>apt</category><category>network_activity</category><category>kimsuky</category><category>lummac2</category><category>magentocore</category><category>fakeapp</category></item></channel></rss>