Researchers Unearth North Korean Led Espionage Campaign

Share post:

Researchers at Proofpoint recently uncovered a spying campaign launched by state-sponsored North Korean cyber attackers.

The group, known as TA406, is part of several groups identified as Kimsuky that focus mainly on espionage, money-grabbing, malware distribution, phishing, intelligence gathering and cryptocurrency theft.

The group targets several countries, including North America, Russia, China, South Korea, Japan, Germany, France, the United Kingdom, South Africa, India, and others, and uses phishing emails embellished with topics related to nuclear safety, politics, and Korean foreign policy to target high-ranking elected officials.

Some of the tactics used in phishing attacks involve imitating real people using basic HTTP authentication, which displays a browser dialog asking for the user’s documents.

Once an deployed malware is opened, the file creates a scheduled task called “Twitter Alarm,” which allows the threat actors to deploy additional payloads every 15 minutes. Once executed, the EXE also opens a web browser to a PDF file of a legitimate NK News article hosted on the actor’s infrastructure.

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

Sleeper Supply Chain Attack Activates After 6 Years

A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by exploiting vulnerabilities in 21...

Russian-Controlled Open Source Tool Raises Alarms Over U.S. Cybersecurity

A widely used open-source Go library, easyjson, used in healthcare, finance and even defence has come under scrutiny...

Signal Archiving Tool Used By Trump Admin Is Breached, Raising Alarms Over Messaging Security (EDITORIAL)

(EDITORIAL) A messaging tool used by Trump administration officials to archive encrypted Signal messages has been hacked —...

Anthropic Warns: AI “Virtual Employees” Could Pose Security Risks Within a Year

Anthropic, a leading artificial intelligence company, anticipates that AI-powered virtual employees could begin operating within corporate networks as...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways