North Korean hackers targeting security researchers on Twitter

9


Google believes that hackers in North Korea are pretending to be cybersecurity bloggers and targeting researchers within the area on social media platforms like Twitter and LinkedIn.

The search large introduced that its Threat Analysis Group has “identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations.”

It attributed the marketing campaign to a government-backed entity based mostly in North Korea. The nation’s cooperation workplace with South Korea didn’t instantly reply to CNBC’s request for remark..

Google mentioned the actors have focused particular security researchers with a “novel social engineering” approach, though it did not specify which researchers have been focused.

Google’s Adam Weidemann mentioned in a weblog on Monday that the hackers arrange a analysis weblog and created a number of Twitter profiles to interact with security researchers.

The hackers used these accounts to put up hyperlinks to the weblog and share movies of software program exploits that they claimed to have discovered, Google mentioned. 

They additionally used LinkedIn, Telegram, Discord, Keybase and electronic mail to interact with security researchers, Google mentioned.

“After establishing initial communications, the actors would ask the targeted researcher if they wanted to collaborate on vulnerability research together,” wrote Weidemann.

The actors then shared a gaggle of recordsdata with the researchers that contained malware — software program that’s deliberately designed to trigger injury to a pc, server, shopper, or pc community.

Google listed a number of accounts and web sites that it believes are managed by the hackers. The listing consists of 10 Twitter profiles and 5 LinkedIn profiles.

Google mentioned it additionally noticed situations of security researchers being compromised after visiting the actors’ weblog.

“In each of these cases, the researchers have followed a link on Twitter to a write-up hosted on blog.br0vvnn[.]io, and shortly thereafter, a malicious service was installed on the researcher’s system and an in-memory backdoor would begin beaconing to an actor-owned command and control server,” wrote Weidemann.

Google mentioned the victims have been working totally patched and up-to-date variations of Windows 10 and its personal Chrome browser.

“At this time we’re unable to confirm the mechanism of compromise, but we welcome any information others might have,” Weidemann wrote.

“Chrome vulnerabilities, including those being exploited in the wild, are eligible for reward payout under Chrome’s Vulnerability Reward Program. We encourage anyone who discovers a Chrome vulnerability to report that activity.”



Source hyperlink

close

Hi!
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every week.

We don’t spam! Read our privacy policy for more info.