Thursday, March 28, 2024

North Korean Hackers Targeted COVID Vaccine Maker AstraZeneca

British pharmaceutical company AstraZeneca, one of the manufacturers leading the way towards developing a Covid-19 vaccine, has been targeted by North Korean hackers. 

Suspected North Korean hackers have tried to break into the systems of AstraZeneca in recent weeks, two people with knowledge of the matter informed Reuters.

The hackers posed as recruiters on LinkedIn and WhatsApp and approached AstraZeneca staff with fake job offers. The documents purporting to be job descriptions were laced with “malicious code designed to gain access to a victim’s computer,” according to the report.

Though they were not successful, the attacks targeted a broad set of people, including staff working on COVID-19 research. The North Korean mission to the United Nations in Geneva reportedly declined to discuss the allegations.

The sources said Reuters “The tools and techniques used in the attacks showed they were a part of an ongoing hacking campaign that U.S. officials and cybersecurity researchers have attributed to North Korea.”

The campaign has previously focused on defense companies and media organizations but pivoted to COVID-related targets in recent weeks, according to three people who have investigated the attacks.

Targeting vaccines

Microsoft said this month it had seen two North Korean hacking groups target vaccine developers in multiple countries, including by “sending messages with fabricated job descriptions.” Microsoft did not name any of the targeted organizations.

South Korean lawmakers said, that the country’s intelligence agency had foiled a number of those attempts.

Reuters has previously reported that hackers from Iran, China, and Russia have attempted to break into leading drugmakers and even the World Health Organisation this year. Tehran, Beijing, and Moscow have all denied the allegations.

Some of the accounts used in the attacks on AstraZeneca were registered to Russian email addresses, one among the sources said, during a possible plan to mislead investigators.

North Korea has been blamed for a few of the most foremost cyber incidents, including the 2014 attack on Sony Pictures deployed in retaliation for the blockbuster movie “The Interview,” the global WannaCry ransomware pandemic in 2017, and many others.

Pyongyang has described the allegations as a part of attempts by Washington to smear its image.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

COVID-19 Research Organizations Attacked by Chinese Hackers Group

The Importance of Cybersecurity in The Post-COVID-19 World

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles