• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

North Korean Threat Actor Targeting SME Businesses with Ransomware

You are here: Home / General Cyber Security News / North Korean Threat Actor Targeting SME Businesses with Ransomware
July 15, 2022

North Korean risk actors are focusing on modest and mid-sized corporations with ransomware, according to Microsoft Security researchers. The team of actors, going by the title H0lyGh0st, have been developing and conducting cross-countrywide malware attacks for above a year, doing effective attacks as early as September 2021. 

As perfectly as making use of a ransomware payload, the group – tracked by Microsoft as DEV-0530 – maintains an .onion site to talk with their victims. Using the approach of double extortion, their technique entails encrypting “all documents on the goal device” and making use of the file extension .h0lyenc. They then “send the target a sample of the files” as evidence prior to demanding a Bitcoin payment in trade for “restoring entry to the files.” Microsoft Danger Intelligence Center (MSTIC) has noticed that there is probably overlap between H0lyGh0st and PLUTONIUM (aka DarkSeoul or Andariel), an additional North Korean-dependent group.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


MSTIC has proposed two achievable rationales for these ransomware attacks. The initially risk is that they are specifically funded by the North Korean state for financial good reasons to offset the money strike the state has taken from international sanctions, pure disasters, drought and COVID-19 lockdowns. The next and similarly plausible determination is that non-condition-affiliated people today with ties to PLUTONIUM infrastructure and tools are just “moonlighting for own gain.” 

The report shut by providing tips for companies and people on how to defend towards ransomware and extortion threats. These bundled:

  • Building credential cleanliness
  • Auditing credential exposure
  • Prioritizing deployment of Energetic Listing updates
  • Cloud hardening
  • Imposing Multifactor Authentication (MFA) on all accounts, take away people excluded from MFA, and strictly need MFA from all devices, in all spots, at all moments.
  • Enabling passwordless authentication solutions for accounts that guidance passwordless. For accounts that nevertheless involve passwords, use authenticator apps
  • Disabling legacy authentication.

  • Some components of this post are sourced from:
    www.infosecurity-journal.com

    Previous Post: «new cache side channel attack can de anonymize targeted online users New Cache Side Channel Attack Can De-Anonymize Targeted Online Users
    Next Post: 5 Key Things We Learned from CISOs of Smaller Enterprises Survey 5 key things we learned from cisos of smaller enterprises»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
    • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
    • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
    • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
    • “Getting to Yes”: An Anti-Sales Guide for MSPs
    • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
    • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
    • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
    • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
    • 5 Threats That Reshaped Web Security This Year [2025]

    Copyright © TheCyberSecurity.News, All Rights Reserved.