• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover hacking operations targeting government entities in south korea

Researchers Uncover Hacking Operations Targeting Government Entities in South Korea

You are here: Home / General Cyber Security News / Researchers Uncover Hacking Operations Targeting Government Entities in South Korea
June 2, 2021

A North Korean threat actor active considering that 2012 has been guiding a new espionage campaign targeting high-profile government officials linked with its southern counterpart to install an Android and Windows backdoor for accumulating sensitive details.

Cybersecurity agency Malwarebytes attributed the action to a menace actor tracked as Kimsuky, with the qualified entities comprising of the Korea Internet and Security Company (KISA), Ministry of International Affairs, Ambassador of the Embassy of Sri Lanka to the Condition, International Atomic Electrical power Agency (IAEA) Nuclear Security Officer, Deputy Consul Typical at Korean Consulate Normal in Hong Kong, Seoul Countrywide University, and Daishin Securities.

password auditor

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The development is only the most current in a collection of surveillance efforts aimed at South Korea. Believed to be working on behalf of the North Korean regime, Kimsuky (aka Velvet Chollima, Black Banshee, and Thallium) has a monitor file of singling out South Korean entities even though increasing their victimology to the U.S., Russia, and different nations in Europe.

Past November, the adversary was connected to a new modular adware suite termed “KGH_SPY” that enables it to have out reconnaissance of focus on networks, log keystrokes, and steal private information, as nicely as a stealthy malware below the name “CSPY Downloader” which is built to thwart investigation and obtain supplemental payloads.

Kimsuky’s attack infrastructure is composed of a variety of phishing web sites that mimic well-identified sites these types of as Gmail, Microsoft Outlook, and Telegram, with an goal to trick victims into moving into their qualifications. “This is one of the primary approaches utilised by this actor to acquire email addresses that afterwards will be utilized to ship spear-phishing email messages,” Malwarebytes researcher Hossein Jazi claimed.

Kimsuky APT

In working with social engineering as a core element of its functions, the objective is to distribute a malware dropper that can take the kind of a ZIP archive file connected to the email messages, which ultimately leads to the deployment of an encoded DLL payload referred to as AppleSeed, a backdoor that’s been place to use by Kimusky as early as 2019.

“In addition to utilizing the AppleSeed backdoor to target Windows consumers, the actor also has employed an Android backdoor to focus on Android buyers,” Jazi famous. “The Android backdoor can be considered as the cell variant of the AppleSeed backdoor. It uses the very same command styles as the Windows 1. Also, both Android and Windows backdoors have utilised the similar infrastructure.”

AppleSeed has all the hallmarks of a standard backdoor, with myriad capabilities to document keystrokes, seize screenshots, accumulate paperwork with particular extensions (.txt, .ppt, .hwp, .pdf, and .doc), and gather info from removable media equipment related to the equipment that is then uploaded to a distant command-and-handle server.

But probably the most interesting discovery of all is that the threat actor phone calls them selves Thallium in the malware source code, which is the moniker assigned by Microsoft centered on its custom of naming country-point out hacking teams immediately after chemical things.

Located this post attention-grabbing? Follow THN on Fb, Twitter  and LinkedIn to browse far more distinctive written content we submit.


Some sections of this short article are sourced from:
thehackernews.com

Previous Post: «the incident response plan preparing for a rainy day The Incident Response Plan – Preparing for a Rainy Day
Next Post: Banking Fraud up 159% as Transactions Hit Pre-Pandemic Volumes Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.