Article Details

Scrape Timestamp (UTC): 2024-02-20 10:56:53.148

Source: https://thehackernews.com/2024/02/new-report-reveals-north-korean-hackers.html

Original Article Text

Click to Toggle View

New Report Reveals North Korean Hackers Targeting Defense Firms Worldwide. The North Korean state-sponsored threat actors have been attributed to a cyber espionage campaign targeting the defense sector across the world. In a joint advisory published by Germany's Federal Office for the Protection of the Constitution (BfV) and South Korea's National Intelligence Service (NIS), the agencies said the goal of the attacks is to plunder advanced defense technologies in a "cost-effective" manner. "The regime is using the military technologies to modernize and improve the performance of conventional weapons and to develop new strategic weapon systems including ballistic missiles, reconnaissance satellites and submarines," they noted. The infamous Lazarus Group has been blamed for one of the two hacking incidents, which involved the use of social engineering to infiltrate the defense sector as part of a long-standing operation called Dream Job. The campaign has been ongoing since August 2020 over several waves. In these attacks, the threat actors either create a fake profile or leverage legitimate-but-compromised profiles on platforms like LinkedIn to approach prospective targets and build trust with them, before offering lucrative job opportunities and shifting the conversation to a different messaging service like WhatsApp to initiate the recruitment process. Victims are then sent coding assignments and job offer documents laden with malware that, when launched, activate the infection procedure to compromise their computers. "Universally, the circumstance that employees usually do not talk to their colleagues or employer about job offers plays into the hands of the attacker," the agencies said. "The LAZARUS group changed its tools throughout the campaign and demonstrated more than once that it is capable of developing whatever is necessary to suit the situation." The second case concerns an intrusion into a defense research center towards the end of 2022 by executing a software supply chain attack against an unnamed company responsible for maintaining one of the research center's web servers. "The cyber actor further infiltrated the research facility by deploying remote-control malware through a patch management system (PMS) of the research center, and stole various account information of business portals and email contents," the BfV and NIS said. The breach, which was carried by another North Korea-based threat actor, unfolded over five stages - "The actor avoided carrying out a direct attack against its target, which maintained a high level of security, but rather made an initial attack against its vendor, the maintenance and repair company," the agencies explained. "This indicates that the actor took advantage of the trustful relationship between the two entities." The security bulletin is the second to be published by BfV and NIS in as many years. In March 2023, the agencies warned of Kimsuky actors using rogue browser extensions to steal users' Gmail inboxes. Kimsuky was sanctioned by the U.S. government in November 2023. The development comes as blockchain analytics firm Chainalysis revealed that the Lazarus Group has switched to using YoMix bitcoin mixer to launder stolen proceeds following the shutdown of Sinbad late last year, indicating their ability to adapt their modus operandi in response to law enforcement actions. "Sinbad became a preferred mixer for North Korea-affiliated hackers in 2022, soon after the sanctioning of Tornado Cash, which had previously been the go-to for these sophisticated cybercriminals," the company said. "With Sinbad out of the picture, Bitcoin-based mixer YoMix has acted as a replacement." The malicious activities are the work of a plethora of North Korean hacking units operating under the broad Lazarus umbrella, which are known to engage in an array of hacking operations ranging from cyber espionage to cryptocurrency thefts, ransomware, and supply chain attacks to achieve their strategic goals. ⚡ Free Risk Assessment from Vanta Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.

Daily Brief Summary

NATION STATE ACTIVITY // North Korean Hackers Escalate Global Defense Sector Cyber Espionage

North Korean state-sponsored hackers are conducting a cyber espionage campaign targeting global defense industries to steal advanced technologies.

The joint advisory issued by Germany and South Korea attributes the attacks to North Korea's pursuit of military advancements including ballistic missiles and submarines.

The Lazarus Group engaged in social engineering through fake or compromised LinkedIn profiles since August 2020, using the "Dream Job" operation to distribute malware.

Victims are tricked with job opportunities and malware-infected documents that compromise their systems when opened.

A separate attack on a defense research center involved a software supply chain attack via a web server maintenance vendor, allowing the infiltration of the facility and theft of sensitive information.

The second North Korean hacking operation demonstrates the strategic use of supply chain vulnerabilities and the exploitation of trusted relationships to bypass high-security environments.

North Korean hackers have adapted their laundering techniques using the YoMix bitcoin mixer following the shutdown of a previously preferred mixer, showing their ability to pivot in response to law enforcement.