HomeCII/OTNorth Korea Profits from Stonefly APT Swarms US Companies

North Korea Profits from Stonefly APT Swarms US Companies

Published on

spot_img

Symantec’s Threat Hunter Team revealed this week that a notorious North Korean advanced persistent threat (APT) known as “Stonefly” has shifted its focus towards targeting private companies in the US with the aim of financial gain. This state-sponsored group, also identified as Andariel, APT45, Silent Chollima, and Onyx Sleet, is defying an indictment and a $10 million reward from the US Department of Justice (DoJ) as it seeks to bolster funds for the Kim Jong-Un regime.

The recent attacks orchestrated by Stonefly, which is associated with North Korea’s Reconnaissance General Bureau (RGB), targeted three organizations in the US during August, shortly after the DoJ crackdown on the group. The victims of these attacks did not possess any apparent intelligence value and were likely being primed for a ransomware assault. Fortunately, these intrusions were detected before they could fully materialize.

Symantec researchers emphasized that the group’s shift towards financial gain is a new development, as other North Korean APTs are typically engaged in securing foreign currency for the regime. In the past, Stonefly has targeted healthcare providers, including hospitals, during the pandemic, drawing attention from the DoJ. The group is also known for pursuing high-value espionage targets such as US Air Force bases, NASA’s Office of Inspector General, and government entities in China, South Korea, and Taiwan.

According to Symantec’s analysis, Stonefly’s focus has primarily shifted towards espionage operations against specific, high-value targets since at least 2019. The group specializes in targeting organizations that harbor classified or highly sensitive information and intellectual property. Previously, Stonefly had not been involved in financially motivated attacks.

With its altered focus on extracting funds from commercial entities, it is imperative for businesses to familiarize themselves with Stonefly’s indicators of compromise (IoCs) to mitigate potential ransomware attacks. Despite ransomware not being deployed in the August incidents, Stonefly managed to introduce numerous tools from its arsenal before being intercepted.

During the attacks, Stonefly deployed custom malware dubbed Backdoor.Preft (also known as Dtrack or Valefor) along with a fake Tableau certificate highlighted by Microsoft. The attackers also utilized two other certificates unique to this campaign. Additionally, the group’s toolkit included a variety of malicious tools such as Nukebot, Mimikatz, keyloggers, the Sliver penetration testing framework, the PuTTY SSH client, Plink, Megatools, and FastReverseProxy.

The evolving tactics of Stonefly underscore the ongoing threat posed by North Korean APTs to cybersecurity and national security interests. As private companies in the US increasingly become targets for financial exploitation, it is crucial for organizations to enhance their cyber defenses and remain vigilant against sophisticated threat actors like Stonefly.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...