Friday, December 8, 2023

Sapphire Sleet Hackers Attacking LinkedIn Users Based on Their Expertise

In a recent development, cybersecurity experts have identified a significant shift in the tactics employed by Sapphire Sleet, a notorious threat actor known for cryptocurrency theft through social engineering. 

Microsoft’s threat intelligence team has been closely monitoring Sapphire Sleet, a nation-state-sponsored hacker group based in North Korea, which has been targeting organizations within the cryptocurrency sector.

Sapphire Sleet’s New Tactics

Traditionally, Sapphire Sleet has been associated with stealing cryptocurrencies by manipulating social engineering techniques. 

However, their latest modus operandi involves masquerading as skills assessment portals on websites, specifically targeting users on LinkedIn’s professional networking platform.

The hackers initiate their attacks by identifying potential targets on LinkedIn and enticing them with deceptive lures related to skills assessment.

Once a successful communication is established, the threat actor then moves the conversation to other platforms, where they continue their nefarious activities.

In the past, Sapphire Sleet utilized malicious attachments or links to pages hosted on legitimate platforms like GitHub to execute their attacks. 

However, the threat actor has adapted its strategy due to the quick detection and removal of these malicious files.

Protect Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.

Sapphire Sleet’s Evolution

Now, Sapphire Sleet has resorted to creating its websites, designed to appear as skills assessment portals.

These deceptive websites are crafted to entice recruiters into registering for accounts, allowing the threat actor to gather sensitive information. 

These websites are password-protected and hosted on various malicious domains and subdomains to impede analysis. 

Despite their attempts to conceal their activities, Microsoft has proactively blocked these domains using Microsoft Defender SmartScreen and Network Protection.

This evolution in Sapphire Sleet’s tactics highlights the constant arms race between cybercriminals and cybersecurity professionals. 

As hackers adapt and refine their methods, individuals and organizations need to remain vigilant. 

Microsoft has provided detailed reports and resources for its customers to stay updated on this evolving threat and protect themselves effectively.

Users must exercise caution in this ever-changing cybersecurity landscape, especially on professional networking platforms like LinkedIn. 

Being aware of suspicious messages and requests, verifying the authenticity of websites, and relying on reputable security tools are vital steps in safeguarding against sophisticated threats like Sapphire Sleet and their deceptive skills assessment portals. 

Stay informed and stay secure.

Secures your storage & backup systems With StorageGuard – Watch a 40-second Video Tour.


Latest articles

Exploitation Methods Used by PlugX Malware Revealed by Splunk Research

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid...

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative...

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat...

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as...

Endpoint Strategies for 2024 and beyond

Converge and Defend

What's the pulse of Unified Endpoint Management and Security (UEMS) in Europe? Join us live to uncover the strategies that are defining endpoint security in the region.

Related Articles