April 26, 2024

Researchers from Mandiant has spotted a North Korean APT group that uses crypto theft to fund its main goal of cyber-espionage for the Kim Jong-un regime.

To be precise, APT43 is a prolific state actor whose publicly reported activities have been attributed to Kimsuky or Thallium. It is apparently linked to the Reconnaissance General Bureau (RGB), North Korea’s main foreign intelligence service.

The modus of operandi relies on the prolific spear-phishing campaigns, supported by social engineering and spoofed domains and email addresses. Its main targets are South Korean and US-based government organizations, academics and think tanks focused on Korean geopolitical issues.

Advertisements

The group has created many spoofed and fake personas for its social engineering efforts, and sometimes also uses them as cover identities for buying operational tooling and infrastructure.

APT43 be extremely successful with these fake reporter emails, generating high success rates in eliciting a response from targets. Perhaps most interestingly, the group is self-funded, targeting individual victims rather than cryptocurrency exchanges to generate revenue for its state-focused operations, Mandiant claimed.

One such effort used a malicious Android app to target probable Chinese users looking for cryptocurrency loans. Mandiant has also tracked 10 million “phishing NFTs” delivered to crypto users on multiple blockchains since June 2022.

APT43 also uses hash rental and cloud mining services to launder stolen cryptocurrency into clean cryptocurrency. While Mandiant has been tracking the group since 2018, the Google-owned threat intelligence outfit is now designating it as an official advanced persistent threat group.

Advertisements

Mandiant labels major, distinct clearly defined hacking groups as “APTs” for state-backed outfits and “FINs” for financially motivated cybercriminal gangs. But below that level, they also keep tabs on dozens of clusters of hacking activity referred to as “UNCs” where there are lower levels of confidence around attribution or overlap with other identified groups or campaigns.

Once the researchers gather enough telemetry and intelligence about a particular UNC and are confident, they represent a new or distinct group of operators, they will sometimes graduate a cluster to a fully-fledged APT or FIN group.

Sl.NOMalware Used
1AMADEY
2BENCHMARK
3BIGRAISIN
4BITTERSWEET
5BRAVEPRINCE
6COINTOSS
7DINOLAB
8DRIVEDOWN
9EGGHATCH
10FASTFIRE
11GOLDDRAGON.
12GOLDDROP
13GOLDSMELT
14GRAYZONE
15HANGMAN,
16JURASSICSHELL
17LANDMARK
18LATEOP
19LOGCABIN
20LONEJOGGER
21METASPLOIT
22PASSMARK
23PENCILDOWN
24PENDOWN
25PUMPKINBAR
26QUASARRAT
27SLIMCURL
28SOURDOUGH
29SPICYTUNA
30SWEETDROP
31TROIBOMB
32VENOMBITE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from TheCyberThrone

Subscribe now to keep reading and get access to the full archive.

Continue reading