Sunday, June 15, 2025
HomeCyber Security NewsVHD Ransomware Linked to North Korea’s Cyber-Army Targets Financial Institutions

VHD Ransomware Linked to North Korea’s Cyber-Army Targets Financial Institutions

Published on

SIEM as a Service

Follow Us on Google News

Experts from Trellix discovered that VHD Ransomware was linked to North Korea’s cyber army. The cyber-army of North Korea has been divided into several units, all of which have different tasks and report to ‘Bureau (or Lab) 121’.

Unit 180, also known as APT38 is responsible for the attacks on foreign financial systems, including banks and cryptocurrency exchanges.

The report says the actors of Unit 180 generally live in overseas countries such as China, Russia, Malaysia, Thailand, Bangladesh, Indonesia, India, Kenya, and Mozambique to hide the unit’s link to the hermit kingdom that is North Korea.

- Advertisement - Google News

Also, the defectors have exposed that obtaining funds for the government is done by more actors than the country’s ‘elite hackers’.

VHD Ransomware

VHD is a standard ransomware tool that spreads through the drives connected to the target device, encrypts all the files, and deletes all system volume information folders that prevent the impacted system could be restored.

Researchers used the source code of the VHD ransomware family and identified the following families:

  • BEAF ransomware
  • PXJ ransomware
  • ZZZZ ransomware
  • CHiCHi ransomware

From the analysis, four letters of the ransomware “BEAF” (BEAF is the extension used for the encrypted files), are exactly the same first four bytes of the handshake of APT38’s tool known as Beefeater.

The ZZZZ ransomware is a replica of the Beaf ransomware family. Researchers say the Tflower and ChiChi families share some little code with VHD, but that would be more generic functions than typical shared code and functionality.

The experts used the Hilbert curves to visualize the code of the different malware families and found both Tflower and ChiChi are vastly different when compared to VHD.

A picture containing text

Description automatically generated
Hilbert curve similarity

To identify financial trails with an overlap between the families, researchers extracted the Bitcoin (BTC) wallet addresses and started tracing and monitoring the transactions.

“We did not find any overlap in transfer wallets between the families. We did find, however, that the paid ransom amounts were relatively small.”, say the researchers.

Final Word

According to the experts from Trellix, besides global banks, blockchain providers and users from South Korea were also attacked using spear-phishing emails, fake mobile applications, and also fake companies.

All these attacks seemed to target the APAC region with targets in Japan and Malaysia. Therefore, experts suspect these attacks might have been executed to discover if ransomware is a valuable way of gaining income.

“Based on our research, combined intelligence, and observations of the smaller targeted ransomware attacks, Trellix attributes them to DPRK affiliated hackers with high confidence.”, concludes the blog.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...