Thursday, January 30, 2025
HomeComputer SecurityFBI Uncovered North Korean Malware Attack KEYMARBLE on U.S Government Entities to...

FBI Uncovered North Korean Malware Attack KEYMARBLE on U.S Government Entities to Stealing Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

DHS and FBI identified North Korean malware KEYMARBLE that related to HIDDEN COBRA  to attack U.S government entities to capture screenshots, stealing sensitive data, modifying the system files etc.

This sophisticated malware variant used by the North Korean government to perform cyberattack that targets various organization and Governments.

It works under one of the most dangerous cyber espionage group called HIDDEN COBRA which already involved various cyber-attack around the world.

DHS & FBI has been issued a warning about this cyber attack across the US including the government IT infrastructure.

KEYMARBLE also work’s as a Remote Access Trojan (RAT) to perform various malicious activities such as accessing device configuration data, downloading additional files, executing commands, modifying the registry, capturing screenshots, and exfiltrating data.

HIDDEN COBRA uses various IP address to maintain a presence on victims machine and performing a powerful exploitation on the victim’s network.

How does it Malware Works

Initially, it distributing via malicious 32-bit Windows executable file that acts as RAT to infiltrate the network and access the target network.

Once KEYMARBLE executed, it de-obfuscates its application programming interfaces using port 443 which attempt to connect hardcoded C&C server IP addresses to receive further instruction from the attacker.

During the Command & Control server communication RAT using XOR cryptographic algorithm to ensure the secure communication to receive the instructions.

crypto algorithms the malware used to secure its data transfer

Once its receive the further instruction from the attackers via C&C server, it performing following operation in the compromised victims system.

  • Download and upload files
  • Execute secondary payloads
  • Execute shell commands
  • Terminate running processes
  • Delete files
  • Search files
  • Set file attributes
  • Create registry entries for storing data:(HKEY_CURRENT_USER\SOFTWARE\Microsoft\WABE\DataPath)
  • Collect device information from installed storage devices (disk free space and their type)
  • List running processes information
  • Capture screenshots
  • Collect and send information about the victim’s system (operating system, CPU, MAC address, computer name, language settings, list of disk devices and their type, time elapsed since the system was started, and unique identifier of the victim’s system)

According to US-CERT This MAR includes malware descriptions related to HIDDEN COBRA, suggested response actions and recommended mitigation techniques.

“Users or administrators should flag activity associated with the malware, report the activity to the DHS National Cybersecurity and Communications Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and give the activity the highest priority for enhanced mitigation.”

Mitigations

  • Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
  • Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
  • Exercise caution when using removable media (e.g., USB thumbdrives, external drives, CDs, etc.).
  • Scan all software downloaded from the Internet prior to executing.
  • Maintain situational awareness of the latest threats and implement appropriate ACLs.
  • Maintain up-to-date antivirus signatures and engines.
  • Keep operating system patches up-to-date.
  • Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrator’s group unless required.
  • Enforce a strong password policy and implement regular password changes.
  • Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
  • Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
  • Disable unnecessary services on agency workstations and servers.
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations...

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has...