HomeCII/OTNorth Korean Hackers Utilize Zero-Day Exploit to Target Security Researchers

North Korean Hackers Utilize Zero-Day Exploit to Target Security Researchers

Published on

spot_img

North Korean threat actors have launched a new campaign targeting security researchers, using a zero-day exploit to compromise their machines. Google’s security researchers, Clement Lecigne and Maddie Stone, have issued a warning about this latest attack.

The attackers began their operation by contacting the researchers through social media platforms like X (formerly Twitter) or Mastodon, under the guise of collaborating on security research. Once the conversation was established, they would then move to end-to-end encrypted instant messaging apps such as Signal, WhatsApp, or Wire. After gaining the trust of the researchers, the attackers would deliver a malicious file containing a zero-day exploit.

Upon successful exploitation, the shellcode implemented a series of anti-virtual machine checks before transmitting the collected information, along with a screenshot, to a command and control domain controlled by the attackers. Additionally, the attackers directed the researchers towards a Windows tool called GetSymbol, which downloads debugging symbols from Microsoft, Google, Mozilla, and Citrix symbol servers for reverse engineers. However, this tool also had the capability to download and execute arbitrary code from an attacker-controlled domain.

To mitigate the impact of this attack, Google’s TAG (Threat Analysis Group) advised researchers who had downloaded or run the malicious tool to ensure that their systems are in a known clean state, which might require a complete reinstallation of the operating system. However, Google has not yet disclosed the specific software affected by the zero-day exploit.

In their official statement, Lecigne and Stone stated that they had reported the vulnerability to the affected vendor, and that it was in the process of being patched. Once the patch is released, Google will share additional technical details and analysis of the exploits involved, in accordance with their disclosure policies.

This is not the first time that North Korean threat actors have targeted security researchers. A similar campaign was revealed in January 2021, when these actors created accounts on various platforms, including Twitter, LinkedIn, Keybase, and Telegram, to directly contact security researchers. Microsoft also provided details about this campaign, known as Zinc attacks, in a blog post.

In the previous campaign, the attackers would establish trust with the researchers and then share a link, asking them to check the content. Clicking on the link would result in the installation of a malicious service and a backdoor beaconing to a command and control server operated by the threat actors.

These targeted attacks on security researchers highlight the importance of maintaining strong cybersecurity practices, even within the research community. It is crucial for researchers to exercise caution when engaging with unknown individuals, especially on social media platforms, and to verify the authenticity of any files or links shared with them.

As the cybersecurity landscape continues to evolve, it is essential for organizations and individuals to stay vigilant and up-to-date with the latest threats and vulnerabilities. Collaborative efforts between security researchers, vendors, and governments are vital in tackling these sophisticated cyber attacks and safeguarding against future threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...