Thursday, June 1, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Threat actor APT43 targets US, Europe, Japan, South Korea

Researcher by Researcher
April 10, 2023
in Cybersecurity
0
Threat actor APT43 targets US, Europe, Japan, South Korea
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Global cybersecurity stock image.
Image: Getty Images/iStockphoto/bluebay2014

Security research from Mandiant and Google indicates that targeting by APT43 and its subset Archipelago aligns with North Korean interests.

Jump to:

Related articles

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

Who is APT43?

Must-read security coverage

New research from Mandiant exposes APT43, a cyberespionage threat actor supporting the interests of the North Korean regime; the group is also referred to as Kimsuky or Thallium. ATP43 focuses on collecting strategic intelligence by running credential harvesting attacks and by using social engineering to successfully compromise its targets.

According to Mandiant, who has tracked APT43 since 2018, the threat actor aligns with the mission of the Reconnaissance General Bureau, the main foreign intelligence service from North Korea.

In terms of attribution indicators, APT43 has shared infrastructure and tools with known North Korean operators and North Korean threat actors. In particular, malware and tools have been shared between APT43 and the infamous Lazarus threat actor.

What is the Archipelago threat actor?

In a recent report, Google’s Threat Analysis Group provides intelligence about a threat actor dubbed Archipelago, which they describe as a subset of APT43 activities they’ve been tracking since 2012.

Who does APT43 target?

The APT43 group primarily targeted foreign policy and nuclear security issues, yet it switched in 2021 to targeting health-related verticals, probably due to the worldwide COVID-19 pandemic.

APT43 targets South Korea and the U.S., as well as Japan and Europe, especially in manufacturing against goods whose export to North Korea has been restricted such as fuel, machinery, metals, transportation vehicles and weapons. In addition, the group targets business services, education, research and think tanks with a focus on geopolitical and nuclear policy, and governmental entities (Figure A).

Figure A

This illustration shows a flat globe with heavily targeted regions in shades of red.
Image: Mandiant. APT43’s targeting by country.

APT43 also carries out cybercrime operations likely to fund itself and the regime.

Who does Archipelago target?

The Archipelago subset of APT43 has been observed targeting government and military personnel, think tanks, policymakers, academics and researchers in South Korea, the U.S. and elsewhere.

APT43’s spear phishing and social engineering techniques

APT43 mostly uses spear phishing as a way to compromise its targets. The group often creates convincing personas or spoof key individuals’ identities. Once they compromise such a key person, they might use the person’s contact list for additional spear phishing targeting.

The threat actor sometimes poses as reporters or think-tank analysts to bring targets to provide them with their expert knowledge by asking them specific questions (Figure B).

Figure B

This screenshot shows a sample email sent by APT43 masquerading as a journalist..
Image: Mandiant. Sample email sent by APT43 masquerading as a journalist.

A technique exposed by Google reveals that Archipelago often sends phishing emails in which they masquerade as a representative of a media outlet or think tank asking the target for an interview. A click on a link is needed to see the questions, yet it redirects the victim to a fake Google Drive or Microsoft 365 login page. After the victim enters their credentials, the person is redirected to a document with questions.

Google reports that Archipelago often interacts with a victim for several days or weeks and establishes trust before sending a malicious link or malicious file.

Archipelago might use browser-in-the-browser techniques to trick users who see a fake browser window inside the actual browser window. The fake window shows a legitimate domain to entice users to provide their credentials to the attackers (Figure C).

Figure C

This screenshot shows a sample browser-in-the-browser phishing page.
Image: Google. Sample browser-in-the-browser phishing page used by Archipelago threat actor.

Another technique used by Archipelago consists of sending benign PDF files supposedly from some entity who informs the target about malicious logins they should check (Figure D).

Figure D

This screenshot shows a Sample Archipelago browser-in-the-browser phishing page. Image: Google
Image: Google. Sample Archipelago browser-in-the-browser phishing page.

APT43’s use of malware families and tools

APT43 relies on several malware families and tools. Public malware families used by APT43 include Gh0st RAT, Quasar RAT and Amadey, yet the threat actor mostly uses a nonpublic malware known as LATEOP or BabyShark, probably developed by the group.

Archipelago has recently incorporated more malware in their operations, often using password-protected attachments as a way to bypass antivirus scanning (Figure E).

Figure E

This screenshot shows a sample Archipelago email targeting a user with password-protected content.
Image: Google. Sample Archipelago email targeting a user with password-protected content.

Archipelago made experiments using a then new technique based on files hosted on Google Drive. Small malicious payloads were encoded directly in filenames of 0 bytes content files. Filenames for files hosted on Google Drive also contained C2 server names, yet Google disrupted that activity, and the group stopped using such techniques on Google Drive.

ISO files were used by Archipelago to deliver malware contained in a zip file. Once the password-protected zip file was unzipped, a document installed VBS-based malware related to BabyShark known to be used by APT43.

More recently, Archipelago tried to use a malicious Chrome browser extension named SHARPEXT, which is able to parse and exfiltrate emails from active Gmail or AOL mail tabs. As a result, Google improved security in the Chrome extension ecosystem, making it much harder for attackers to deploy that malicious extension.

APT43’s interest in cryptocurrency

According to Mandiant, APT43 has a particular interest in cryptocurrencies, which they use for purchasing infrastructure and hardware devices to sustain its operations.

To cover their tracks, APT43 makes use of hash rental services and cloud mining services, which can be used to mine cryptocurrency without any blockchain association to the buyer’s original payments.

In addition, APT43 used a malicious Android application to target Chinese users interested in cryptocurrency loans and harvest for credentials.

How to protect from this APT43 security threat

  • Educate users about the social engineering techniques used by APT43 and Archipelago.
  • Train users to detect phishing attempts and immediately report it to their security staff.
  • Use security solutions to detect phishing emails or malware infection attempts.
  • Keep operating systems and software up to date and patched.

Experts in geopolitics and international policies in particular should be trained to detect an approach from an attacker masquerading as a journalist or reporter. Careful triage and examination of such people approaching experts must be done prior to any exchange of information or intelligence.

Disclosure: I work for Trend Micro, but the views expressed in this article are mine.



Source link

Tags: ActorAPT43EuropeJapanKoreaSouthtargetsThreat
Share76Tweet47

Related Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
0

Threat actors are exploiting a critical-severity Zyxel flaw in order to add vulnerable devices to a Mirai botnet variant. While...

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
0

Cisco on Wednesday announced that it’s acquiring California-based cybersecurity firm Armorblox for its artificial intelligence (AI) technology. Armorblox specializes in...

8 best practices for securing your Mac from hackers in 2023

8 best practices for securing your Mac from hackers in 2023

June 1, 2023
0

Best practices for securing your Mac against potential hacks and security vulnerabilities include enabling the firewall, using strong passwords and...

ZuoRAT Malware Found Hitting Home Routers

New SeroXen RAT Emerges | Decipher

June 1, 2023
0

Security researchers are tracking a new fileless RAT named SeroXen that has the capability to evade many EDR systems and...

Sentra Raises $30 Million for DSPM Technology

Chrome 114 Released With 18 Security Fixes

May 31, 2023
0

Google this week announced the release of Chrome 114 to the stable channel with a total of 18 security fixes...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup /

June 1, 2023

Recent Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved