HomeCyber BalkansNorth Korean hackers posed as recruiters to steal credentials from more than...

North Korean hackers posed as recruiters to steal credentials from more than 1,500 developer systems

Published on

spot_img

Researchers at SecurityScorecard have discovered a sophisticated cyberattack campaign that targeted developers in the technology sector, with a particular focus on Europe and India. The attackers employed a layered infrastructure approach in carrying out the attack, which took place in three distinct waves over the course of several months.

During the initial wave in November, 181 developers were targeted, primarily from European technology sectors. The attackers then expanded their scope globally in December, with hundreds of developers falling victim to the campaign. India emerged as a hotspot with 284 victims identified. In January, a new wave of the attack added 233 more victims, with a significant focus on India’s technology sector with 110 systems compromised.

The attackers managed to exfiltrate critical data from their victims, including development credentials, authentication tokens, browser-stored passwords, and system information. This data was transferred to Dropbox, where it was organized and stored systematically by the attackers. The use of persistent connections to Dropbox underscored the attackers’ methodical approach, with some servers maintaining active sessions for extended periods, even up to five hours.

Despite attempts to obfuscate their activities by using multiple VPN tunnels, investigators were able to trace the attacker’s activity back to several IP addresses in North Korea. The attackers routed their connections through Astrill VPN endpoints, then through the Oculus Proxy network IPs in Russia, before finally accessing the command-and-control (C&C) servers hosted by a company known as Stark Industries.

The discovery of this layered infrastructure used by the attackers sheds light on the sophisticated nature of the campaign. By leveraging a multi-faceted approach that spanned across different regions and involved various technologies, the attackers were able to infiltrate a significant number of victims and steal sensitive data undetected for an extended period.

Security experts are now working to analyze the extent of the damage caused by this cyberattack campaign and to develop strategies to prevent future attacks of a similar nature. The collaboration between researchers, cybersecurity professionals, and law enforcement agencies will be crucial in identifying the perpetrators behind this campaign and holding them accountable for their actions.

As the cybersecurity landscape continues to evolve, it is imperative for organizations to remain vigilant and implement robust security measures to protect against increasingly sophisticated threats. By staying informed about the latest trends in cyberattacks and investing in comprehensive security solutions, businesses can mitigate the risks posed by malicious actors and safeguard their sensitive data from unauthorized access.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...