Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » North Korean hackers exploit Facebook Messenger in targeted malware campaign
    Cyber Security

    North Korean hackers exploit Facebook Messenger in targeted malware campaign

    techempireBy techempire3 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMay 16, 2024Editorial DepartmentMalware/cyber espionage

    Malware activity

    The North Korea-linked Kimsuky hacking group has been attributed to a new social engineering attack that uses fictitious Facebook accounts to target targets via Messenger, ultimately spreading malware.

    “The threat actor created a Facebook account pretending to be a public official working in the human rights field in North Korea,” South Korean cybersecurity firm Genians said in a report released last week.

    The statement pointed out that this multi-stage attack campaign, impersonating legitimate individuals, was designed to target North Korean human rights and anti-North Korea activists.

    This approach differs from typical email-based spear phishing tactics by leveraging social media platforms to approach targets via Facebook Messenger and trick them into opening a seemingly private document written by the persona.

    Internet security

    Hosted on OneDrive, the decoy document is a Microsoft Universal Console document disguised as articles or content related to the trilateral summit between Japan, South Korea and the United States – “My_Essay(prof).msc” or “NZZ_Interview_Kohei Yamamoto” .

    This raises the possibility that the campaign may be targeting specific groups of people in Japan and South Korea.

    The use of MSC files to carry out the attack indicates that Kimsuky is leveraging unusual document types to fly under the radar. To further increase the likelihood of a successful infection, the file is disguised as a harmless Word file using a word processor icon.

    If the victim launches the MSC file and agrees to open it using the Microsoft Management Console (MMC), a console screen containing a Word file is displayed, which upon launch initiates the attack sequence.

    This involves running commands to interact with a server controlled by an adversary (“brandwizer.co[.]in”) to display a document hosted on Google Drive (“Korea Forced Labor Claims Settlement Paper.docx”), while executing other instructions in the background to set persistence and collect battery and process information.

    Internet security

    The collected information is then infiltrated into a command and control (C2) server, which is also able to obtain the IP address, user-agent string, and timestamp information from the HTTP request, and pass the relevant payload as needed.

    Genians said some of the tactics, techniques and procedures (TTPs) used in this campaign overlap with Kimsuky’s previous campaigns to spread malware such as ReconShark, which SentinelOne detailed in May 2023.

    “Spear phishing attacks were the most common APT attack method reported in South Korea during the first quarter of this year,” the company noted. “While less commonly reported, covert attacks via social media are also occurring.”

    “Due to their one-to-one, personalized nature, they are not easily detected by security monitoring, and even if victims are aware of them, they are rarely reported externally. Therefore, it is important to detect these personalized threats early.” stage. “

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.