State-backed North Korean hackers have recently managed to exploit vulnerabilities in VPN software updates to spread malware.
According to a South Korea National Cyber Security Center (NCSC) security advisory, threat actors weaponized the flaw to breach networks and distribute malware on affected systems.
The malicious campaign is believed to be tied to a national initiative North Korean President Kim Jong-un announced in January 2023 to modernize factories nationwide. Security experts suspect that perpetrators aim to steal trade secrets from South Korea.
Kimsuky (APT43) and Andariel (APT45), both state-sponsored threat groups previously associated with the notorious Lazarus Group, are reportedly involved in the recent malicious campaign.
The NCSC warns that these groups, operating under North Korea’s Reconnaissance General Bureau, are notably targeting the same sector at once for specific governmental aims, an unprecedented approach.
In one of the incidents, reported in January 2024, threat actors compromised a South Korean construction trade organization’s website, leveraging it to spread malware to visitors.
Perpetrators tricked employees into downloading and installing malware on the systems by prompting them with fake security updates, named "NX_PRNMAN" or "TrustPKI," upon attempting to log into the site.
To make matters worse, the malicious installers bore legitimate signatures from a Korean defense company, circumventing antivirus detection.
Once deployed, the malware would execute several nefarious activities, such as capturing screenshots, stealing sensitive data from web browsers and pilfering GPKI certificates, SSH keys, and other data from apps like Sticky Notes and FileZilla.
In a second incident, the Andariel group exploited a vulnerability in a local VPN software’s communication protocol to enable the distribution of fake software updates, covertly installing the DoraRAT malware on compromised systems.
Perpetrators leveraged the trojan to steal large files, including ones that detailed machinery and equipment designs, and exfiltrate them to a remote command and control (C2) server.
Specialized software like Bitdefender Ultimate Security can protect systems against trojans, fake updates, and other digital intrusions. It accurately detects and protects against viruses, worms, Trojans, spyware, ransomware, zero-day exploits and rootkits.
Furthermore, it encompasses an extensive range of advanced features, including network threat prevention, behavioral detection technology, and web attack prevention modules.
tags
Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion. Before becoming a Security Analyst, he covered tech and security topics.
View all postsNovember 14, 2024
September 06, 2024