A cyber espionage group has targeted several South Korean think tanks, as well as a smaller number of entities in China, to deliver a data-stealing trojan.

Kaspersky researcher Dmitry Tarakanov said the campaign stoodout because the malware's command hub communicated with a Bulgarian email server.
He said the trojan's authors used Korean hieroglyphs to code the malware.
At least 11 organizations in South Korea were targeted, as well as two in China, Kaspersky found.
The Kimsuky trojan has keylogging capabilities and collects other sensitive data like directory listing information and Word documents on machines.
Due to IP addresses and email accounts used in the attacks, researchers believe the group has ties to North Korea.