Skip to content

Threat Actor Selling Root Access to South Korean Government Server With Lateral Movement to 42 Internal Hosts

Dark Web Informer - Cyber Threat Intelligence

Threat Actor Selling Root Access to South Korean Government Server With Lateral Movement to 42 Internal Hosts

March 11, 2026 - 11:32:55 AM UTC
South KoreaSouth Korea
Government
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API
Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Stay ahead of cyber threats with real-time breach tracking, expert analysis, and high quality evidence - built for security professionals, researchers, journalists, and everyday people who take their privacy seriously.

Quick Facts

Date & Time 2026-03-11 11:32:55 UTC
Threat Actor zSenior
Victim Country South KoreaSouth Korea
Industry Government
Victim Domain *.go.kr
Access Level Root
Category Initial Access
Severity Critical
Network Open Web
Price Waiting Offers

Incident Overview

A threat actor operating under the handle zSenior is selling root-level access to a South Korean government server hosted on a *.go.kr domain, the official top-level domain reserved for South Korean government agencies. The actor claims to have completed full privilege escalation and states that pivoting to 42 internal live hosts from the compromised server should be straightforward.


Beyond the initial root access, the actor reports having obtained PostgreSQL database superuser access on a second internal server at 192.168.0.147, which they describe as containing PII. They also believe this secondary server may be vulnerable to remote code execution, further expanding the potential attack surface. The compromised server is running CentOS and has been online continuously for 1,642 days, with disk usage showing a 50GB root partition and a 142GB home partition at 55% capacity.


The actor emphasizes they are selling full access only and explicitly states this is not for traffic, database, or malware distribution. Proof is available upon request, pricing is open to offers, and escrow is accepted. This represents a significant national security concern given the government domain and the extensive lateral movement potential across dozens of internal systems.

Claim URL - For Subscribers Only

The claim URL for this listing can be found on the Threat Feed or Ransomware Feed for subscribers.

Image Preview

Forum listing showing root access to South Korean government server for sale with lateral movement to 42 internal hosts

Latest