• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      Computing Tech Marketing & Innovation Awards
      • Date: 12 Jun 2020
      • TBC, London
      event logo
      AI & Machine Learning Awards 2020

      The Computing AI & Machine Learning Awards recognise the best companies, individuals, and projects in the AI space today. The awards cover every corner of the industry: security, ethics, data analysis, innovation and more, as well as showcasing the movers and shakers: the technology heroes and projects that deserve industry-wide praise. The winners will be announced in London on 1 July 2020. Entries are now open!

      • Date: 01 Jul 2020
      • TBC, London
      Digital Technology Leader Awards

      For too long the limelight has shone exclusively on marketing staff. The Computing Digital Technology Leaders Awards exist to recognise the achievements of the individuals and companies who are really making it happen at the coal face of the digital technology stack: from website design and coding to UX and project management, from scrum masters and product managers, all the way up to the CDO.

      • Date: 08 Jul 2020
      • London TBC, London
      event logo
      Computing DevOps Live 2020
      • Date: 14 Jul 2020
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    •  

       

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Hacking

South Korean APT uses five zero-day flaws to turn the tables on North Korea

The group, linked to South Korea, used bugs in Internet Explorer, Google Chrome and the Windows Kernel to target North Koreans

Five zero-days were used by an advanced hacking group last year to target individuals inside North Korea
Five zero-days were used by an advanced hacking group last year to target individuals inside North Korea
  • Dev Kundaliya
  • 27 March 2020
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

An unidentified but sophisticated group of hackers used at least five zero-day vulnerabilities last year to target individuals inside North Korea or professionals working on DPRK-related issues.

That's according to Google's Threat Analysis Group (TAG), which analysed nearly 40,000 warnings relating to nation-state hack attacks in 2019, and was surprised to see the activities of one single actor that carried out some highly sophisticated attacks targeting North Korean professionals.

To conduct this espionage campaign, threat actor capitalised on five zero-day vulnerabilities that impacted Internet Explorer, Google Chrome, and Windows Kernel.

"Finding this many zero-day exploits from the same actor in a relatively short time frame is rare," the researchers noted.

The flaws were exploited using phishing emails containing malicious attachments or links to rogue websites. Hackers also used watering hole attacks to infect victims' system with malware when victims visited some legitimate but compromised websites.

While Google did not specify the identity of the threat group behind the campaign, some security experts believe it could the work of South Korea-backed hackers.

Russian security firm Kaspersky linked the cyber campaign to DarkHotel, a group that has previously targeted North Korean government agencies and is thought to be sponsored by the South Korean government.

"It's really impressive. It shows a level of operational polish," Kaspersky told Wired.

Kaspersky said that it has previously observed DarkHotel exploiting two of the five vulnerabilities - one in Internet Explorer and one in Windows - to plant malware on the systems of potential targets.

DarkHotel group is believed to be active since at least 2007, and in 2014, Kaspersky researchers spotted the group compromising hotel Wi-Fi networks in efforts to carry out attacks against specific hotel guests.

The group is mostly interested in collecting information such as emails, documents, and other bits of sensitive data from targets.

"The DarkHotel's main purpose is a sophisticated cyber-espionage campaign aimed at corporate executives: CEOs, senior vice presidents, sales and marketing directors, and top R&D staff have all been targeted," Kaspersky notes.

In another finding, Google said that it noticed a spike in phishing attacks impersonating news outlets and journalists in 2019. In many cases, the primary intention of the attackers was to spread disinformation through other reporters.

Google said that attackers first sent benign emails in hopes of building a rapport with a foreign policy expert or a journalist, before sending a follow-up email with a malicious attachment.

  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Hacking
  • Security
  • South Korea
  • Kaspersky
  • Internet Explorer
  • zero-days
  • North Korea
  • Google
  • DarkHotel

More on Hacking

Maze ransomware group says it has encrypted Chubb cyber insurer's systems
Maze ransomware group claims to have encrypted Chubb cyber insurer's systems

Chubb rejects the ransomware pgroup's claim, however, saying its network is fully operational

  • Hacking
  • 27 March 2020
Cyber security experts join hands to block coronavirus-related cyber campaigns
Cyber security experts collaborate to block coronavirus-related cyber campaigns

The new group includes professionals from technology firms like Amazon and Microsoft

  • Hacking
  • 26 March 2020
Tupperware website infected with payment card skimmer
Tupperware accused of ignoring warnings over ecommerce website compromised by web-skimming JavaScript

Tupperware finally gets round to cleaning its ecommerce site days after being told that it had been compromised by a credit-card-stealing Magecart group

  • Hacking
  • 26 March 2020
It's not known how much information was compromised in one of the largest China-sourced cyber attacks to date
Surge in attacks from China-linked APT41 targeting unpatched Citrix servers and Cisco routers

APT41 attacks carried out between January and March targeted unsecured Citrix NetScaler servers and Cisco routers

  • Security
  • 25 March 2020
Spanish hospitals have been targeted with coronavirus-themed ransomware
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks

Groups behind Netwalker switched phishing baits to coronavirus last week - as other ransomware groups pledged to avoid medical facilities

  • Security
  • 24 March 2020
blog comments powered by Disqus
Back to Top

Most read

Working from home, keeping connected: 17 video conferencing and collaboration tools to consider
Working from home, keeping connected: 17 video conferencing and collaboration tools to consider
How Hillarys responded to the coronavirus outbreak
How Hillarys responded to the coronavirus outbreak
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
South Korean APT uses five zero-day flaws to turn the tables on North Korea
South Korean APT uses five zero-day flaws to turn the tables on North Korea
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading