• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
north korean hackers targeting healthcare with ransomware to fund its

North Korean Hackers Targeting Healthcare with Ransomware to Fund its Operations

You are here: Home / General Cyber Security News / North Korean Hackers Targeting Healthcare with Ransomware to Fund its Operations
February 10, 2023

Point out-backed hackers from North Korea are conducting ransomware attacks versus health care and critical infrastructure services to fund illicit things to do, U.S. and South Korean cybersecurity and intelligence companies warned in a joint advisory.

The attacks, which need cryptocurrency ransoms in exchange for recovering obtain to encrypted documents, are created to help North Korea’s countrywide-amount priorities and aims.

This incorporates “cyber functions concentrating on the United States and South Korea governments — particular targets involve Section of Defense Information Networks and Defense Industrial Foundation member networks,” the authorities mentioned.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Threat actors with North Korea have been linked to espionage, economic theft, and cryptojacking functions for decades, which include the infamous WannaCry ransomware attacks of 2017 that infected hundreds of thousands of devices located in in excess of 150 nations around the world.

Considering that then, North Korean country-state crews have dabbled in multiple ransomware strains these types of as VHD, Maui, and H0lyGh0st to crank out a continuous stream of illegal revenues for the sanctions-hit routine.

Other than procuring its infrastructure as a result of cryptocurrency produced via its felony pursuits, the adversary is regarded to operate below 3rd-party foreign affiliate identities to conceal their involvement.

Attack chains mounted by the hacking crew entail the exploitation of known security flaws in Apache Log4j, SonicWall, and TerraMaster NAS appliances (e.g., CVE 2021-44228, CVE-2021-20038, and CVE-2022-24990) to obtain first obtain, pursuing it up by reconnaissance, lateral movement, and ransomware deployment.

In addition to applying privately made ransomware, the actors have been observed leveraging off-the-shelf equipment like BitLocker, DeadBolt, ech0raix, Jigsaw, and YourRansom for encrypting data files, not to point out even impersonating other ransomware teams such as REvil.

As mitigations, the agencies advocate companies to apply the theory of the very least privilege, disable needless network system administration interfaces, implement multi-layer network segmentation, need phishing-resistant authentication controls, and retain periodic info backups.

The notify comes as a new report from the United Nations located that North Korean hackers stole document-breaking virtual belongings estimated to be truly worth between $630 million and additional than $1 billion in 2022.

The report, seen by the Related Press, claimed the risk actors made use of more and more subtle approaches to achieve accessibility to digital networks concerned in cyberfinance, and to steal info from governments, firms, and persons that could be handy in North Korea’s nuclear and ballistic missile courses.

It further more termed out Kimsuky, Lazarus Team, and Andariel, which are all portion of the Reconnaissance General Bureau (RGB), for continuing to focus on victims with the purpose of making revenue and soliciting information and facts of worth to the hermit kingdom.

Discovered this write-up appealing? Stick to us on Twitter  and LinkedIn to study additional unique written content we post.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «the it pro podcast: uprooting legacy tech The IT Pro Podcast: Uprooting legacy tech
Next Post: AWS malvertising campaign a “potent threat” to users, researchers warn aws malvertising campaign a “potent threat” to users, researchers warn»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.