HomeCyber BalkansNorth Korean hackers posed as recruiters to steal credentials from more than...

North Korean hackers posed as recruiters to steal credentials from more than 1,500 developer systems

Published on

spot_img

Researchers at SecurityScorecard have discovered a sophisticated cyberattack campaign that targeted developers in the technology sector, with a particular focus on Europe and India. The attackers employed a layered infrastructure approach in carrying out the attack, which took place in three distinct waves over the course of several months.

During the initial wave in November, 181 developers were targeted, primarily from European technology sectors. The attackers then expanded their scope globally in December, with hundreds of developers falling victim to the campaign. India emerged as a hotspot with 284 victims identified. In January, a new wave of the attack added 233 more victims, with a significant focus on India’s technology sector with 110 systems compromised.

The attackers managed to exfiltrate critical data from their victims, including development credentials, authentication tokens, browser-stored passwords, and system information. This data was transferred to Dropbox, where it was organized and stored systematically by the attackers. The use of persistent connections to Dropbox underscored the attackers’ methodical approach, with some servers maintaining active sessions for extended periods, even up to five hours.

Despite attempts to obfuscate their activities by using multiple VPN tunnels, investigators were able to trace the attacker’s activity back to several IP addresses in North Korea. The attackers routed their connections through Astrill VPN endpoints, then through the Oculus Proxy network IPs in Russia, before finally accessing the command-and-control (C&C) servers hosted by a company known as Stark Industries.

The discovery of this layered infrastructure used by the attackers sheds light on the sophisticated nature of the campaign. By leveraging a multi-faceted approach that spanned across different regions and involved various technologies, the attackers were able to infiltrate a significant number of victims and steal sensitive data undetected for an extended period.

Security experts are now working to analyze the extent of the damage caused by this cyberattack campaign and to develop strategies to prevent future attacks of a similar nature. The collaboration between researchers, cybersecurity professionals, and law enforcement agencies will be crucial in identifying the perpetrators behind this campaign and holding them accountable for their actions.

As the cybersecurity landscape continues to evolve, it is imperative for organizations to remain vigilant and implement robust security measures to protect against increasingly sophisticated threats. By staying informed about the latest trends in cyberattacks and investing in comprehensive security solutions, businesses can mitigate the risks posed by malicious actors and safeguard their sensitive data from unauthorized access.

Source link

Latest articles

Bridewell Joins Global Incident Response Network FIRST as a Full Member

Bridewell Achieves Full Membership in the Forum of Incident Response and Security Teams (FIRST) In...

Live Webinar: From AI Data Risk to Clean Recovery – A Practical CISO Playbook for Trusted Resilience Operations

Chris Bevil: A Beacon of Expertise in Cyber Resilience Chris Bevil's career has been marked...

Anthropic Launches Claude Security for AI Vulnerability Scanning

Anthropic Launches Claude Security Public Beta for Enhanced Cybersecurity Solutions Anthropic has officially introduced Claude...

Claude Mythos Fears Shock Japan’s Financial Sector

Japan's financial sector has recently taken significant steps to mitigate the cybersecurity threats posed...

More like this

Bridewell Joins Global Incident Response Network FIRST as a Full Member

Bridewell Achieves Full Membership in the Forum of Incident Response and Security Teams (FIRST) In...

Live Webinar: From AI Data Risk to Clean Recovery – A Practical CISO Playbook for Trusted Resilience Operations

Chris Bevil: A Beacon of Expertise in Cyber Resilience Chris Bevil's career has been marked...

Anthropic Launches Claude Security for AI Vulnerability Scanning

Anthropic Launches Claude Security Public Beta for Enhanced Cybersecurity Solutions Anthropic has officially introduced Claude...