• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
north korean hackers exploit zero day bug to target cybersecurity researchers

North Korean Hackers Exploit Zero-Day Bug to Target Cybersecurity Researchers

You are here: Home / General Cyber Security News / North Korean Hackers Exploit Zero-Day Bug to Target Cybersecurity Researchers
September 8, 2023

Menace actors linked with North Korea are continuing to concentrate on the cybersecurity local community utilizing a zero-working day bug in unspecified application above the earlier a number of months to infiltrate their equipment.

The conclusions come from Google’s Danger Examination Group (TAG), which uncovered the adversary placing up fake accounts on social media platforms like X (formerly Twitter) and Mastodon to forge associations with probable targets and develop trust.

“In just one scenario, they carried on a months-very long dialogue, trying to collaborate with a security researcher on subjects of mutual desire,” security scientists Clement Lecigne and Maddie Stone claimed. “Immediately after original get in touch with via X, they moved to an encrypted messaging app such as Signal, WhatsApp, or Wire.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The social engineering workout ultimately paves the way for a malicious file that contains at minimum one zero-day in a common program bundle. The vulnerability is at the moment in the procedure of being fastened.

The payload, for its element, performs a quantity of anti-virtual device (VM) checks and transmits the collected details, together with a screenshot, back again to an attacker-managed server.

Cybersecurity

A look for on X demonstrates that the now-suspended account has been active due to the fact at the very least October 2022, with the actor releasing proof-of-idea (PoC) exploit code for higher-severity privilege escalation flaws in the Windows Kernel this sort of as CVE-2021-34514 and CVE-2022-21881.

This is not the 1st time North Korean actors have leveraged collaboration-themed lures to infect victims. In July 2023, GitHub disclosed particulars of an npm campaign in which adversaries tracked as TraderTraitor (aka Jade Sleet) employed phony personas to goal the cybersecurity sector, among other people.

“Just after creating speak to with a concentrate on, the risk actor invites the concentrate on to collaborate on a GitHub repository and convinces the goal to clone and execute its contents,” the Microsoft-owned enterprise said at the time.

Google TAG stated it also located a standalone Windows instrument named “GetSymbol” developed by the attackers and hosted on GitHub as a probable secondary infection vector. It has been forked 23 moments to day.

The rigged program, posted on GitHub way again in September 2022 and now taken down, offers a signifies to “download debugging symbols from Microsoft, Google, Mozilla, and Citrix image servers for reverse engineers.”

But it also arrives with the means to obtain and execute arbitrary code from a command-and-control (C2) area.

The disclosure will come as the AhnLab Security Emergency Response Middle (ASEC) exposed that North Korean nation-point out actor recognised as ScarCruft is leveraging LNK file lures in phishing email messages to provide a backdoor capable of harvesting sensitive info and executing malicious instructions.

It also follows new conclusions from Microsoft that “many North Korean risk actors have not too long ago focused the Russian government and defense sector – possible for intelligence selection – though at the same time delivering content guidance for Russia in its war on Ukraine.”

Impending WEBINARWay Too Vulnerable: Uncovering the Point out of the Id Attack Area

Realized MFA? PAM? Assistance account security? Find out how nicely-geared up your group definitely is from identification threats

Supercharge Your Techniques

The targeting of Russian defense organizations was also highlighted by SentinelOne last thirty day period, which unveiled that each Lazarus Team (aka Diamond Sleet or Labyrinth Chollima) and ScarCruft (aka Ricochet Chollima or Ruby Sleet) breached NPO Mashinostroyeniya, a Russian missile engineering firm, to facilitate intelligence collecting.

The two actors have also been observed infiltrating arms manufacturing corporations centered in Germany and Israel from November 2022 to January 2023, not to point out compromising an aerospace investigate institute in Russia as properly as defense firms in Brazil, Czechia, Finland, Italy, Norway, and Poland considering that the begin of the year.

“This implies that the North Korean governing administration is assigning various danger actor groups at when to satisfy superior-precedence collection prerequisites to increase the country’s armed service abilities,” the tech giant reported.

Earlier this 7 days, the U.S. Federal Bureau of Investigation (FBI) implicated the Lazarus Group as guiding the theft of 41 million in virtual forex from Stake.com, an online casino and betting platform.

It said that the stolen cash involved with the Ethereum, Binance Good Chain (BSC), and Polygon networks from Stake.com have been moved to 33 unique wallets on or about September 4, 2023.

“North Korean cyber danger actors pursue cyber operations aiming to (1) accumulate intelligence on the functions of the state’s perceived adversaries: South Korea, the United States, and Japan, (2) acquire intelligence on other countries’ armed service capabilities to strengthen their have, and (3) gather cryptocurrency money for the state,” Microsoft said.

Discovered this post fascinating? Comply with us on Twitter  and LinkedIn to read far more unique written content we publish.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «cisa warning: nation state hackers exploit fortinet and zoho vulnerabilities CISA Warning: Nation-State Hackers Exploit Fortinet and Zoho Vulnerabilities
Next Post: Cisco Issues Urgent Fix for Authentication Bypass Bug Affecting BroadWorks Platform cisco issues urgent fix for authentication bypass bug affecting broadworks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.