North Korean state-sponsored hacking groups, including Kimsuky (APT43) and Andariel (APT45), have significantly increased cyberattacks on South Korean construction and machinery sectors.
This surge aligns with Kim Jong-un’s “Local Development 20×10 Policy,” aimed at modernizing industrial facilities across North Korea.
In response, South Korea’s National Cyber Security Center (NCSC) and intelligence agencies have issued a comprehensive joint cybersecurity advisory, in which they urged that North Korean hackers have been exploiting VPN update flaws to breach networks.
Not only that, but they also detailed several other important things. The advisory aims to help organizations prevent and mitigate potential damage, as stolen data could be used to advance North Korea’s industrial and urban development plans.
Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Free Access
There were two cases were highlighted and they are:-
In January 2024, the Kimsuky group of North Korea carried out a complex supply chain attack on a South Korean construction industry website.
The hackers attacked the security authentication software and hijacked the NX_PRNMAN system.
This malware, called “TrollAgent,” which was coded in Go, infected the PCs of government employees, public institutions, and construction professionals who accessed the compromised site of security authentication software.
To work without detection, TrollAgent collected information about systems, capturing them via screenshots, and downloading all sorts of sensitive data including passwords from browsers’ memory locations, GPKI certificates, SSH keys, and even FileZilla’s client services.
The cyber attackers used a real digital certificate from “D2Innovation” which allowed them to evade some security checks.
Such occurrences are significant as the complexity and detailed nature of North Korean cyber operations against South Korea’s infrastructure sectors increases.
In April 2024, Andariel, a North Korean hacking group, perpetuated a complex attack against South Korean construction and machinery firms by exploiting the loopholes in local VPNs and server security software.
It took advantage of holes in client-server communication protocols that focused on update activities lacking enough authentication procedures.
Apart from this, Andariel’s method involved:-
These attacks enabled Andariel to gain remote control over infected machines and indicated the changing strategies behind North Korea’s cyber campaigns and how South Korea’s industrial infrastructure must be properly strengthened.
Here below we have mentioned all the mitigations:-
How to Build a Security Framework With Limited Resources IT Security Team (PDF) - Free Guide
Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from the Indonesian…
IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating system…
The Apache Software Foundation has issued a security alert regarding a critical vulnerability in Apache…
The Chinese National Internet Emergency Center (CNIE) has revealed two significant cases of cyber espionage…
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions…
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through…