spot_img

Researchers Unearth North Korean Led Espionage Campaign

Share post:

Researchers at Proofpoint recently uncovered a spying campaign launched by state-sponsored North Korean cyber attackers.

The group, known as TA406, is part of several groups identified as Kimsuky that focus mainly on espionage, money-grabbing, malware distribution, phishing, intelligence gathering and cryptocurrency theft.

The group targets several countries, including North America, Russia, China, South Korea, Japan, Germany, France, the United Kingdom, South Africa, India, and others, and uses phishing emails embellished with topics related to nuclear safety, politics, and Korean foreign policy to target high-ranking elected officials.

Some of the tactics used in phishing attacks involve imitating real people using basic HTTP authentication, which displays a browser dialog asking for the user’s documents.

Once an deployed malware is opened, the file creates a scheduled task called “Twitter Alarm,” which allows the threat actors to deploy additional payloads every 15 minutes. Once executed, the EXE also opens a web browser to a PDF file of a legitimate NK News article hosted on the actor’s infrastructure.

For more information, read the original story in Bleeping Computer.

Featured Tech Jobs

spot_img

SUBSCRIBE NOW

Related articles

Federal Bureau of Investigation (FBI) warns of scammers using AI for sextortion

The FBI has warned about scammers using AI to create explicit deepfake images and videos known as "sextortion." Scammers...

Florida man pleads guilty to selling counterfeit Cisco gear

Onur Aksoy, a 39-year-old entrepreneur from Miami, has confessed to engaging in a massive counterfeit scheme involving Cisco...

Survey reveals insecurity increase in Software-as-a-Service (SaaS) market

A survey conducted by CSA and Adaptive Shield revealed an increase in the amount of security incidents within...

British Airways, BBC, Boots affected by MOVEit vulnerability

British Airways, the BBC, and U.K. pharmacy chain Boots fell victim to a data breach caused by a...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways