➤Summary
The Kimsuky breach in August 2025 has shaken the cybersecurity landscape. Known for spear-phishing campaigns and state-backed espionage, North Korea’s Kimsuky Advanced Persistent Threat (APT) group has now become the target. Two hackers — Saber and cyb0rg — infiltrated a Kimsuky-linked workstation and released 8.9 GB of sensitive data during DEF CON 33. The archive was first published on the hacker-oriented forum Phrack 🛑 and later mirrored on Distributed Denial of Secrets (DDoSecrets), making the breach widely accessible.
The leak includes phishing logs, malware source code, and operational histories that shed unprecedented light on the group’s internal workings. Security analysts have called it one of the most impactful state-sponsored leaks in recent years.
Saber and cyb0rg are self-described “ethical hackers” who claim no political allegiance. In their Phrack post, they accused Kimsuky of “hacking for greed and control” rather than skill and curiosity. Their stated aim was to “return stolen knowledge to the people” — a clear attempt to position themselves in contrast to regime-aligned actors.
Despite the significance of this leak, there is no verified record of previous breaches linked to these two hackers. Multiple reputable sources confirm this appears to be their first public operation, raising questions about whether they are new actors or previously low-profile operatives now stepping into the spotlight.
The dataset, initially posted on Phrack, contained:
The choice of Phrack for publication — a legendary underground platform in hacking culture — ensured instant visibility among advanced practitioners. Within hours, the content was mirrored by DDoSecrets for long-term access.
This Kimsuky leak offers unprecedented insight into an APT’s phishing infrastructure, malware toolkits, and operator habits. Previous Kimsuky campaigns exploited BlueKeep (RDP) and Microsoft Equation Editor vulnerabilities to deploy custom malware such as MySpy, RDPWrap, and tailored keyloggers. With the leaked operational data, defenders can now map and disrupt much of the group’s infrastructure. 💡
To mitigate related threats immediately:
✅ Tip: Use publicly available threat intel feeds to compare your traffic logs against the exposed Kimsuky indicators — many are already listed by major security vendors.
“This dump gives a new dimension to cyber-espionage analysis, essentially burning the APT’s infrastructure and forcing them to rebuild from scratch.” — Bill Toulas, cybersecurity journalist (BleepingComputer)
The Kimsuky breach is more than a leak — it’s a public dismantling of a state-sponsored espionage machine. By publishing sensitive tools and logs, Saber and cyb0rg have dealt a rare and significant blow to a notorious APT. Whether this is their first and only act or the start of a new wave of hacktivist activity remains to be seen. For now, organizations should act quickly, apply the leaked intelligence, and strengthen defenses.
🔍 Discover much more in our complete guide at darknetsearch.com
🚀 Request a demo NOW at darknetsearch.com
Your data might already be exposed. Most companies find out too late. Let ’s change that. Trusted by 100+ security teams.
🚀Ask for a demo NOW →