CyberSecurity SEE

North Korean Hackers Imitate Reporters to Swipe Credentials.

North Korean Hackers Imitate Reporters to Swipe Credentials.

In recent news, it has been revealed that the North Korean APT group Kimsuky has been running a social engineering operation that targets experts in North Korean affairs from the non-government sector. The group has been posing as journalists and academics to conduct spear-phishing attempts to gather intelligence from think tanks, research centers, academic institutions, and various media organizations.

According to SentinelLabs, the campaign that Kimsuky is running focuses on the theft of email credentials, delivery of reconnaissance malware, and theft of NK News subscription credentials. The group’s most recent social engineering attempt was directed at NK News subscribers, an American subscription-based website that offers news and commentary about North Korea.

Kimsuky’s activities seem to be in line with those of the North Korean government. The group has been in operation since at least 2012, and it frequently uses targeted phishing and social engineering techniques to acquire sensitive data and gather intelligence.

Kimsuky, also known as Thallium and Velvet Chollima, has conducted extensive espionage efforts to support national intelligence objectives. The ReconShark malware, which is capable of leaking information, including what detection systems are in use on a device and information about the device itself, was further offered in some cases by the Kimsuky hackers in weaponized Microsoft Office documents.

In a different attack that SentinelLabs observed, Kimsuky sent out emails asking recipients to sign on to a fake NK News subscription service. The North Korean hackers would benefit from having access to users’ NK News login information because they would gain “valuable insights into how the international community assesses and interprets developments related to North Korea, contributing to their broader strategic intelligence-gathering initiatives,” SentinelLabs stated.

Additionally, Kimsuky was seen delivering malware-free Word documents and legitimate Google Docs links to their targets in an attempt to establish a connection with them before beginning their harmful actions. Hackers from Kimsuky carefully organize and carry out their spear-phishing assaults by employing email accounts that closely resemble those of actual people and by creating convincing, realistic content for the target’s communication.

The hackers frequently pose as journalists and writers to enquire about the latest political developments on the Korean peninsula, the North Korean weapons program, US talks, China’s position, and other topics. Themes that have been seen include queries, interview requests, a running survey, and demands for reports or document reviews. As the early emails’ goal is to win the target’s trust rather than quickly corrupt them, they frequently contain no malware and no attachments.

If the target does not reply to these emails, Kimsuky follows up after a few days with another message. The phishing message can use a distinctive North Korean dialect if the target is South Korean. Additionally, the email addresses used to send phishing scams are spoofs of real people or companies, but they are always slightly misspelled.

This persistent threat actor’s threats must be reduced by strong security measures, paying attention to suspicious emails and putting AI-powered email security in place to stop advanced email threats that target business email. Companies and individuals must be aware of these tactics and remain vigilant to ensure that sensitive data is not stolen or compromised.

Source link

Exit mobile version