Monday, March 4, 2024

North Korean Hackers Mimic Journalists To Steal Credentials From Organizations

The North Korean APT group Kimsuky has been running a social engineering operation that targets experts in North Korean affairs from the non-government sector, according to SentinelLabs.

For spear-phishing attempts to gather intelligence from think tanks, research centers, academic institutions, and various media organizations, the North Korean hacking group Kimsuky (also known as APT43) has been posing as a journalist and academic.

“The campaign focuses on the theft of email credentials, delivery of reconnaissance malware, and theft of NK News subscription credentials,” SentinelLabs.

Activities Of the North Korean Hacker Group Kimsuky

Kimsuky’s most recent social engineering attempt was directed at NK News subscribers, an American subscription-based website that offers news and commentary about North Korea.

Kimsuky’s activities seem to be in line with those of the North Korean government.

The gang has been in operation since at least 2012, and it frequently uses targeted phishing and social engineering techniques to acquire sensitive data and gather intelligence.

 Kimsuky, also known as Thallium and Velvet Chollima, has conducted extensive espionage efforts to support national intelligence objectives.

The ReconShark malware, which is capable of leaking information, including what detection systems are in use on a device and information about the device itself, was further offered in some cases by the Kimsuky hackers in weaponized Microsoft Office documents.

In a different attack that SentinelLabs observed, Kimsuky sent out emails asking recipients to sign on to a fake NK News subscription service. 

The North Korean hackers would benefit from having access to users’ NK News login information because they would gain “valuable insights into how the international community assesses and interprets developments related to North Korea, contributing to their broader strategic intelligence-gathering initiatives,” SentinelLabs.

Additionally, Kimsuky was seen delivering malware-free Word documents and legitimate Google Docs links to their targets in an attempt to establish a connection with them before beginning their harmful actions.

Posing As Journalists and Writers

Hackers from Kimsuky carefully organize and carry out their spear-phishing assaults by employing email accounts that closely resemble those of actual people and by creating convincing, realistic content for the target’s communication.

The hackers frequently pose as journalists and writers to enquire about the latest political developments on the Korean peninsula, the North Korean weapons program, US talks, China’s position, and other topics.

Themes that have been seen include queries, interview requests, a running survey, and demands for reports or document reviews.

As the early emails’ goal is to win the target’s trust rather than quickly corrupt them, they frequently contain no malware and no attachments.

Hackers posing as Journalists and Writers (Source: U.S. Government)

If the target does not reply to these emails, Kimsuky follows up after a few days with another message. 

The phishing message can use a distinctive North Korean dialect if the target is South Korean. 

Additionally, the email addresses used to send phishing scams are spoofs of real people or companies, but they are always slightly misspelled.

Thus, it is crucial to maintain attention and put strong security measures in place to reduce this persistent threat actor’s threats.

Stop Advanced Email Threats That Target Your Business Email – Try AI-Powered Email Security

Website

Latest articles

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles