ForumsGeneralGitHub as C2 Infrastructure? DPRK's Latest TTP in South Korea

GitHub as C2 Infrastructure? DPRK's Latest TTP in South Korea

SecurityTrainer_Rosa 4/6/2026 USER

Just caught the latest report from FortiGuard Labs regarding DPRK-linked activity targeting organizations in South Korea. It looks like they are increasingly leveraging GitHub repositories as command-and-control (C2) infrastructure. This is a fascinating evolution of "Living off the Land" tactics, utilizing a trusted domain that is rarely blocked by enterprise firewalls to bypass network segmentation.

The attack chain is pretty clever but standard for these ops:

  • Initial Access: Obfuscated Windows Shortcut (LNK) files.
  • Execution: The LNK files execute a PowerShell script to fetch the next stage.
  • Decoy: A malicious PDF is dropped to distract the user while the C2 traffic commences over GitHub.

Since there isn't a specific CVE to patch here—this is purely an abuse of trust—detection relies heavily on behavioral analysis. Blocking github.com isn't an option for most of us, so we need to look for the anomalies in the traffic patterns or the LNK execution itself.

Here is a quick PowerShell snippet you can use in your hunting scripts to scan for recently created LNK files that might be suspicious:

Get-ChildItem -Path "C:\Users\" -Filter "*.lnk" -Recurse -ErrorAction SilentlyContinue | 
Where-Object { $_.LastWriteTime -gt (Get-Date).AddDays(-7) } | 
ForEach-Object {
    $sh = New-Object -ComObject WScript.Shell
    $target = $sh.CreateShortcut($_.FullName).TargetPath
    if ($target -match "powershell.exe|cmd.exe|mshta.exe") {
        Write-Host "Suspicious LNK found: $($_.FullName) | Target: $target"
    }
}

Are you guys seeing an uptick in trusted-platform abuse in your environments? How are you handling the balance between developer productivity (needing GitHub access) and security risks like this?

EM
EmailSec_Brian4/6/2026

We saw a similar spike last quarter using Trello for C2. It's a nightmare because SSL inspection often struggles with some of these SaaS platforms due to certificate pinning or strict client-side checks. We ended up creating a specific allow-list for official corporate repos and forcing all other GitHub traffic through an explicit proxy with deep packet inspection. It catches a lot, but the false positives are annoying.

SU
Support4/6/2026

Great PowerShell snippet for hunting. As a SOC analyst, I'd recommend pairing that with a KQL query looking for PowerShell processes spawned by explorer.exe that immediately reach out to raw.githubusercontent.com.

DeviceProcessEvents
| where InitiatingProcessFileName == "explorer.exe"
| where FileName == "powershell.exe"
| where ProcessCommandLine has "github.com"
| project Timestamp, DeviceName, ProcessCommandLine

This usually catches the initial execution phase before they try to hide the process.

TH
Threat_Intel_Omar4/6/2026

From a pentester's perspective, this is incredibly effective. Blue teams focus so much on detecting binary drops or weird ports that they forget standard HTTPS to a trusted site. If the attacker uses the GitHub API to fetch issues or gists as encoded commands, it looks almost identical to legitimate developer traffic. Context is key—looking at the User-Agent strings and the timing of the requests usually gives it away.

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created4/6/2026
Last Active4/6/2026
Replies3
Views79