The threat actor tracked as Kimsuky continue to deliver booby trapped documents to targets that are laced with browser extension malware.
Once received and executed, the malicious Hangul Word Processor (HWP) files communicate with the threat actor controlled C2 to gather the SharpEXT browser extension that is leveraged to steal emails and attachments from the victims in the United States, South Korea, and Europe.