Cybersecurity

Korean-speaking APT groups prey on victims in SEA, Korea

Cybersecurity firm Kaspersky reveals in its “APT Trends Reports Q3 2019” that Korean-speaking actors who are part of different hacking groups are spreading threats in the Korean Peninsula and the Southeast Asian (SEA) region.

An Android malware disguising as a mobile messenger or as a cryptocurrency app targeting individual cryptocurrency trader and organization, an APT (Advanced Persistent Threat) group continuously changing its tools to compromise banks, and a subgroup of Lazarus exploiting CVE-2017-10271 to infiltrate a cybersecurity vendor are just a few of Kaspersky’s discoveries included in the report.

Have you read “Kaspersky detects more than 100 million attacks on smart devices in H1 2019”?

KONNI and Korea’s cryptocurrency-related business

Among the new activities monitored by Kaspersky researchers is an Android malware camouflaging as a mobile messenger or as cryptocurrency-related applications.

After working closely with Korea’s local CERT in taking down the attacker’s server, Kaspersky was able to investigate the new malware and to discover its relation to KONNI, a Windows malware strain that has been used in the past to target a human rights organization and personalities with an interest in Korean Peninsula affairs.

It is also known for targeting cryptocurrencies by implementing full-featured functionalities to control an infected Android device and steal personal cryptocurrency using these features.

Stealthy BlueNoroff and banks in SEA

Kaspersky has also monitored BlueNoroff, the financial-arm of the APT group Lazarus, infecting a bank in Myanmar during the third quarter of 2019.

With the prompt alert the global cybersecurity company has sent to the concerned bank, researchers were able to obtain valuable information on how the attackers move laterally to access high-value hosts, such as those owned by the bank’s system engineers interacting with SWIFT.

Kaspersky’s investigation also uncovered the tactics BlueNoroff has been implementing to evade detection, such as using and continuously changing its Powershell script. The group also employs highly sophisticated malicious software which can run as a passive or active backdoor, or even a tunneling tool, depending on the command line parameters.

Andariel APT and South Korean security vendor

Another sub-group of Lazarus, Andariel APT group, has been conducting new efforts to build a new C2 infrastructure targeting vulnerable Weblogic servers through exploiting CVE-2017-10271. This tactic has proven effective after a successful breach by the attackers who implanted malware signed with a legitimate signature belonging to a South Korean security software vendor. The malicious signature has been revoked through the quick response of South Korean CERT.

Traditionally focused on geopolitical espionage and financial intelligence in South Korea, Andariel is also using a brand new type of backdoor dubbed as ApolloZeus. This complex and discreet backdoor uses a relatively large shellcode in order to make analysis difficult.

Based on Kaspersky’s investigation of the artifact found, the group’s attack is an early preparation stage for a new campaign.

“Targeted attacks against financial institutions combine sophisticated techniques that were previously seen only in APT attacks with typical criminal infrastructures used to launder the stolen goods,” said Costin Raiu, director of Global Research & Analysis Team at Kaspersky. “In Q3, we’ve seen advanced threat actors such as Andariel and Lazarus’ BlueNoroff arm attempting to breach not only banks but investment companies and cryptocurrency exchanges, among others. We advise all companies in APAC to be vigilant and take precautions to guard against such attacks,”

DADJOKE and geopolitical entities in Southeast Asia

Aside from the active Korean-speaking APT groups in Q3 2019, Kaspersky has also observed a recent campaign utilizing a piece of malware referred to by FireEye as DADJOKE hunting intelligence in SEA.

Researchers have monitored the use of this malware in a small number of campaigns during the beginning of the year against government, military, and diplomatic entities in the region. The latest known movement of this malware was detected on Aug. 29 involving a select few individuals working for a military organization.

“We have highlighted in our Q2 APT Report the increased attention Korean-focused APT campaigns have been giving toward different organizations and personalities in Southeast Asia and Korea,” said Seongsu Park, senior security researcher at Kaspersky. “True to our prediction, we have monitored several malicious activities of Korean-speaking APT groups and new malware in both regions from July to September this year. Our observations suggest that most of them are intelligence-hungry, both for financial and geopolitical secrets.”

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.