Home · Briefs · CTI Weekly Summary — 2026-W21 (Mon 18 – Sun 24, 2026)
Kimsuky (North Korea-nexus) — Rust-based HelloDoor + TryCloudflare-tunnel C2 expansion documented [SINGLE-SOURCE: Kaspersky]
From CTI Weekly Summary — 2026-W21 (Mon 18 – Sun 24, 2026) · published 2026-05-18
Kaspersky GReAT's 2026-05-14 analysis adds HelloDoor (Rust backdoor) and TryCloudflare-tunnel-based C2 to the known Kimsuky toolchain, deployed alongside the legacy AppleseedDoor and PebbleDash implants. TryCloudflare-tunnel C2 abuse is a low-indicator-of-compromise technique: it uses legitimate Cloudflare infrastructure for C2 relay, producing no unusual certificate or domain patterns. The Rust rewrite reflects the broader nation-state operator trend toward memory-safe implant development to harden against fuzzing-based detection. Swiss entities in government, research, or think-tank roles with Korean Peninsula policy exposure should treat Kimsuky as an active threat.