Home Security North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms

North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms

by


May 10, 2024NewsroomMalware / Cyber Espionage

The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at two South Korean cryptocurrency firms.

“Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads and exfiltration of files,” Kaspersky said in its APT trends report for Q1 2024.

The attacks, which occurred in August and November 2023, entailed the use of legitimate software exclusive to South Korea as an infection pathway, although the precise mechanism used to manipulate the program is currently unclear.

What’s known is that the software establishes a connection to the attacker’s server, leading to the retrieval of a malicious payload that kicks off the infection sequence.

It first-stage serves as an installer for additional malware and a means to establish persistence on the host. It also paves the way for a loader malware that eventually executes Durian.

Cybersecurity

Durian, for its part, is employed to introduce more malware, including AppleSeed, Kimsuky’s staple backdoor of choice, a custom proxy tool known as LazyLoad, as well as other legitimate tools like ngrok and Chrome Remote Desktop.

“Ultimately, the actor implanted the malware to pilfer browser-stored data including cookies and login credentials,” Kaspersky said.

A notable aspect of the attack is the use of LazyLoad, which has been previously put to use by Andariel, a sub-cluster within the Lazarus Group, raising the possibility of a potential collaboration or a tactical overlap between the two threat actors.

The Kimsuky group is known to be active since at least 2012, with its malicious cyber activities also APT43, Black Banshee, Emerald Sleet (formerly Thallium), Springtail, TA427, and Velvet Chollima.

It is assessed to be a subordinate element to the 63rd Research Center, an element within the Reconnaissance General Bureau (RGB), the hermit kingdom’s premier military intelligence organization.

“Kimsuky actors’ primary mission is to provide stolen data and valuable geopolitical insight to the North Korean regime by compromising policy analysts and other experts,” the U.S. Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) said in an alert earlier this month.

“Successful compromises further enable Kimsuky actors to craft more credible and effective spear-phishing emails, which can then be leveraged against more sensitive, higher-value targets.”

The nation-state adversary has also been linked to campaigns that deliver a C#-based remote access trojan and information stealer called TutorialRAT that utilizes Dropbox as a “base for their attacks to evade threat monitoring,” Broadcom-owned Symantec said.

Cybersecurity

“This campaign appears to be an extension of APT43’s BabyShark threat campaign and employs typical spear-phishing techniques, including the use of shortcut (LNK) files,” it added.

The development comes as the AhnLab Security Intelligence Center (ASEC) detailed a campaign orchestrated by another North Korean state-sponsored hacking group called ScarCruft that’s targeting South Korean users with Windows shortcut (LNK) files that culminate in the deployment of RokRAT.

The adversarial collective, also known as APT37, InkySquid, RedEyes, Ricochet Chollima, and Ruby Sleet, is said to be aligned with North Korea’s Ministry of State Security (MSS) and tasked with covert intelligence gathering in support of the nation’s strategic military, political, and economic interests.

“The recently confirmed shortcut files (*.LNK) are found to be targeting South Korean users, particularly those related to North Korea,” ASEC said.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.





Source link

Related Articles

xxxanti beeztube.mobi hot sexy mp4 menyoujan hentaitgp.net jason voorhees hentai indian soft core chupatube.net youjzz ez2 may 8 2023 pinoycinema.org ahensya ng pamahalaan pakistani chut ki chudai pimpmovs.com www xvedio dost ke papa zztube.mobi 300mbfilms.in صور مص الزب arabporna.net نهر العطش لمن تشعر بالحرمان movierulz plz.in bustyporntube.info how to make rangoli video 穂高ゆうき simozo.net 四十路五十路 ロシアav javvideos.net 君島みお 無修正 افلام سكس في المطبخ annarivas.net فيلم سكس قديم rashmi hot videos porncorn.info audiosexstories b grade latest nesaporn.pro high school girls sex videos real life cam eroebony.info painfull porn exbii adult pics teacherporntrends.com nepali school sex