Insider Threat leaks data belonging to Kimsuky North Korea hackers

Insider threat March 19 2025

In recent years, we’ve witnessed both public and private organizations fall victim to increasingly sophisticated cyber-attacks, with stolen data frequently surfacing on breach forums. However, a recent discovery has taken a surprising turn: this time, it’s the hackers themselves who have been exposed.

According to a prominent technology publication, a significant data dump became accessible on the dark web in June 2025. What makes this breach unique is that the leaked information appears to pertain to Kimsuky, a notorious North Korean state-sponsored hacking group. The exposed data reportedly contains detailed records about the threat actors themselves — a rare and significant occurrence in the world of cybersecurity.

Initial analysis suggests that the dataset was scraped from two compromised systems operated by a Kimsuky-affiliated actor known as KIM. One system was a Linux-based workstation, while the other was a Virtual Private Server (VPS), allegedly used to coordinate spear-phishing campaigns — a favored tactic of the group to infiltrate government and corporate networks.

Inside North Korea’s Cyber Arsenal

North Korea’s cyber capabilities are no secret. Under the leadership of Kim Jong Un, the regime has turned cybercrime into a core strategy for funding its international ambitions, including its controversial nuclear program. Reports indicate that Kim has established a specialized digital task force, deploying over a dozen elite hacking units with specific missions — one of which includes probing for vulnerabilities in foreign government networks.

Among these units, Lazarus Group (also known as APT38) stands out as one of the most advanced and aggressive. Backed directly by the North Korean government, Lazarus has been implicated in numerous high-profile cyber-heists targeting financial institutions and cryptocurrency exchanges worldwide. Their objective is clear: steal funds to support the regime’s economic and strategic goals.

Sanctions, Yet No Slowdown

Despite the U.S. government’s ongoing sanctions against North Korea and its cyber entities, the impact appears minimal. The regime continues its cyber operations unabated — compromising systems, stealing sensitive data, and conducting espionage on a global scale.

The recent leak of internal data from Kimsuky is a rare instance of the hunters becoming the hunted. While the full implications of this breach are still being analyzed, cybersecurity experts view it as a potentially valuable source of intelligence that could offer deeper insights into the operations and structure of North Korea’s hacking apparatus.

Join our LinkedIn group Information Security Community!

Naveen Goud
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display