HomeCyber BalkansNorth Korea's ScarCruft APT group is targeting information security professionals

North Korea’s ScarCruft APT group is targeting information security professionals

Published on

spot_img

A recent report issued by SentinelLabs has shed light on a new test campaign by the North Korean advanced persistent threat (APT) group, ScarCruft. The report suggests that the group has been targeting cybersecurity professionals and experts in North Korean affairs, particularly those located in South Korea.

According to the report, ScarCruft has been engaging in a persistent information-gathering campaign, with the aim of obtaining strategic intelligence related to developments in North Korea. The group’s activities are believed to contribute to their understanding of how the international community, particularly the West, perceives developments in North Korea, thus aiding their decision-making processes.

In addition to targeting cybersecurity professionals, SentinelLabs also retrieved malware that is currently in the planning and testing phases of ScarCruft’s development cycle. The malware includes a spectrum of shellcode variants that deliver RokRAT public tooling and two oversized LNK files, created by Windows automatically when users open files, named inteligence.lnk and news.lnk. This malware is designed to run additional payloads and enable data exfiltration. It uses a public threat research report on North Korean threat actor Kimsuky as a decoy. The report, written in Korean, comes from Genians, a South Korean cybersecurity company.

Aleksandar Milenkoski, Senior Threat Researcher at SentinelLabs, noted that while North Korean threat actors have targeted infosec professionals in the past through social engineering attacks, this is the first time they have observed the use of threat research reports as decoys.

These findings are in line with previous campaigns by nation-state actors targeting security researchers. For instance, a government-backed North Korean entity was found to have employed several means to target security researchers working on vulnerability research and development at different companies and organizations. One tactic involved creating fake profiles and blogs to build credibility with researchers before seeking to collaborate on research.

Similarly, an unknown threat actor created phony GitHub accounts from non-existent and legitimate cybersecurity companies, while a suspected North Korean group created fake LinkedIn accounts, posing as recruiters to lure cybersecurity professionals. In these instances, threat actors used social media sites to build rapport with their targets, sometimes carrying on months-long conversations in a bid to ultimately send them malicious files containing a zero-day exploit.

These campaigns underscore the value placed on targeting cybersecurity professionals and threat analysts by nation-state APT actors. Not only can they provide access to non-public intelligence regarding malware and mitigations, but they can also become attack vectors through which security firms themselves could become victims.

It is clear that the cybersecurity community needs to remain vigilant and proactive in protecting themselves against these sophisticated and targeted attacks. As nation-state actors continue to adapt and evolve their tactics, it is essential that information security personnel are aware of the various methods through which they may be targeted and take necessary precautions to safeguard themselves and their organizations.

Source link

Latest articles

Smishing Triad

Rising Threat of SMS Phishing: Targeting Mobile Users Globally As mobile technology continues to dominate...

Health AI Firm Sued for DNA Data Use and Disclosure

Artificial Intelligence & Machine Learning, Data Privacy, ...

Attackers Exploit DVR Command Injection Vulnerability to Deploy Botnet

A recently uncovered malware campaign has drawn considerable attention for its exploitation of a...

Intel Utility Compromised in AppDomain Attack to Deploy Malware

Hackers are exploiting a trusted Intel utility to silently deploy advanced malware, leveraging the...

More like this

Smishing Triad

Rising Threat of SMS Phishing: Targeting Mobile Users Globally As mobile technology continues to dominate...

Health AI Firm Sued for DNA Data Use and Disclosure

Artificial Intelligence & Machine Learning, Data Privacy, ...

Attackers Exploit DVR Command Injection Vulnerability to Deploy Botnet

A recently uncovered malware campaign has drawn considerable attention for its exploitation of a...