HomeCyber BalkansNorth Korean hackers posed as recruiters to steal credentials from more than...

North Korean hackers posed as recruiters to steal credentials from more than 1,500 developer systems

Published on

spot_img

Researchers at SecurityScorecard have discovered a sophisticated cyberattack campaign that targeted developers in the technology sector, with a particular focus on Europe and India. The attackers employed a layered infrastructure approach in carrying out the attack, which took place in three distinct waves over the course of several months.

During the initial wave in November, 181 developers were targeted, primarily from European technology sectors. The attackers then expanded their scope globally in December, with hundreds of developers falling victim to the campaign. India emerged as a hotspot with 284 victims identified. In January, a new wave of the attack added 233 more victims, with a significant focus on India’s technology sector with 110 systems compromised.

The attackers managed to exfiltrate critical data from their victims, including development credentials, authentication tokens, browser-stored passwords, and system information. This data was transferred to Dropbox, where it was organized and stored systematically by the attackers. The use of persistent connections to Dropbox underscored the attackers’ methodical approach, with some servers maintaining active sessions for extended periods, even up to five hours.

Despite attempts to obfuscate their activities by using multiple VPN tunnels, investigators were able to trace the attacker’s activity back to several IP addresses in North Korea. The attackers routed their connections through Astrill VPN endpoints, then through the Oculus Proxy network IPs in Russia, before finally accessing the command-and-control (C&C) servers hosted by a company known as Stark Industries.

The discovery of this layered infrastructure used by the attackers sheds light on the sophisticated nature of the campaign. By leveraging a multi-faceted approach that spanned across different regions and involved various technologies, the attackers were able to infiltrate a significant number of victims and steal sensitive data undetected for an extended period.

Security experts are now working to analyze the extent of the damage caused by this cyberattack campaign and to develop strategies to prevent future attacks of a similar nature. The collaboration between researchers, cybersecurity professionals, and law enforcement agencies will be crucial in identifying the perpetrators behind this campaign and holding them accountable for their actions.

As the cybersecurity landscape continues to evolve, it is imperative for organizations to remain vigilant and implement robust security measures to protect against increasingly sophisticated threats. By staying informed about the latest trends in cyberattacks and investing in comprehensive security solutions, businesses can mitigate the risks posed by malicious actors and safeguard their sensitive data from unauthorized access.

Source link

Latest articles

Hackers Use Fake Resumes to Infiltrate Companies and Steal Credentials

A new cyberattack campaign is turning a routine business process into a serious...

New Critical Citrix NetScaler Vulnerability Comparable in Severity to CitrixBleed2, According to Expert

Increasing Vigilance: The Security Challenges for ADCs and VPNs In the ever-evolving landscape of cybersecurity,...

Could AI Replace the CEO? Zuckerberg’s CEO Agent Sparks Debate

Mark Zuckerberg is reportedly developing a personal AI agent to assist in managing Meta,...

How Cyberattacks Can Transform Battery Farms into Grid Blackouts

Centrii's Rafael Narezzi Discusses the Risks of Inadequate Controls in Decentralized Energy Systems In the...

More like this

Hackers Use Fake Resumes to Infiltrate Companies and Steal Credentials

A new cyberattack campaign is turning a routine business process into a serious...

New Critical Citrix NetScaler Vulnerability Comparable in Severity to CitrixBleed2, According to Expert

Increasing Vigilance: The Security Challenges for ADCs and VPNs In the ever-evolving landscape of cybersecurity,...

Could AI Replace the CEO? Zuckerberg’s CEO Agent Sparks Debate

Mark Zuckerberg is reportedly developing a personal AI agent to assist in managing Meta,...