In a recent cybersecurity threat discovery, the S2W Threat Research and Intelligence Center Talon has identified and analyzed a new type of malware linked to a North Korean-backed Advanced Persistent Threat (APT) group.
The malware, masquerading as a “문서열람 인증 앱” (Document Viewing Authentication App), was first detected on December 13, 2024.
This sophisticated threat has been designated as DocSwap due to its connection with a phishing page impersonating CoinSwap found at its command and control (C2) infrastructure.
When executed, the malware prompts users to grant various permissions, including those for keylogging via accessibility services.
It maintains persistence by generating notifications to request these permissions and by using the StartForeground API to keep itself active even after a system restart.
The threat actors behind this malware have been identified as part of the puNK group, specifically puNK-004, as per a report by Security Researcher in Medium.
This group is tracked by S2W TALON, which monitors various entities linked to North Korea under the puNK classification.
The deployment of DocSwap highlights the evolving tactics of North Korean hackers, who are increasingly leveraging sophisticated phishing and malware techniques to target specific regions, like South Korea.
This threat underscores the importance of vigilance among mobile users, particularly when downloading and granting permissions to apps.
Recommendations
As cybersecurity threats continue to evolve, users and organizations must stay informed and take proactive measures to protect themselves against these sophisticated attacks.
The emergence of DocSwap malware serves as a reminder of the constant threat landscape faced by mobile device users.
By staying alert and employing best practices in cybersecurity, we can mitigate these risks. The collaboration between cybersecurity researchers and the broader community is essential in combating these threats and ensuring a safer digital environment.
As technology advances, so do the methods of cyber attackers. The awareness and proactive measures taken by users play a crucial role in safeguarding against these threats.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra ID…
The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google…
Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated by…
Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool installers,…
Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for…
A recent discovery by security researchers at BeyondTrust has revealed a critical, yet by-design, security…