hackers

North Korean hackers pose as police in spear phishing attacks

The National Office of Investigation (NOI), provides a briefing on emails sent by North Korean hackers, using false identities of South Korean government agencies and news organizations, at the NOI headquarters in Seoul, South Korea. Photo by YONHAP / EPA

May 14 (Asia Today) — A North Korean hacking group linked to the country’s military intelligence agency has posed as police investigators, defense officials and North Korea experts in spear phishing attacks targeting South Korean security and policy figures, a cybersecurity company said Thursday.

Genians, a South Korean information security company, said it detected cyberattacks suspected of being linked to APT37, a North Korea-backed hacking group associated with the Reconnaissance General Bureau.

The group is known for cyber espionage targeting people involved in North Korea affairs and for hacking operations aimed at financial gain.

The latest attacks targeted people working in defense, national security and North Korea-related fields. Spear phishing is a targeted hacking method that uses customized messages and information to trick specific individuals, rather than sending generic malicious emails to large groups.

Hackers used personal details to build trust

According to Genians, the hackers used a range of impersonation tactics to lower victims’ guard, including posing as police officers, defense officials, airline ticket issuers and North Korea research groups.

In one message, the hackers claimed they had obtained North Korean nuclear power plant materials and were preparing a program to help researchers better understand the subject.

In another, a person claiming to be a police investigator said a hacking case had uncovered the recipient’s email address on a suspicious server.

The attackers also used publicly available information and personal data obtained through previous hacking attempts to make their messages appear credible.

In some cases, they used actual names, affiliations and background information before creating emotional rapport, such as claiming to be a defense official approaching retirement who wanted to work on meaningful projects with others in the same field.

Genians said the attacks continued through last month. The final save time of one malicious file was identified as the morning of April 17.

The document was linked to an account named “Lailey,” which Genians said was also used in 2022 attacks impersonating the National Unification Advisory Council and the U.N. human rights office in Seoul.

North Korea seen strengthening cyber operations

The report comes after North Korea reorganized and renamed several intelligence bodies.

In March, North Korea changed the name of its Ministry of State Security to the State Intelligence Bureau. Last September, it expanded and renamed the Reconnaissance General Bureau as the Reconnaissance Intelligence General Bureau.

The Reconnaissance Intelligence General Bureau is believed to be the organization behind APT37.

Genians said the use of the word “intelligence” in both agencies’ names suggests North Korea is seeking to strengthen its external information collection, analysis and cyber operations.

Cybersecurity experts warned that ordinary cryptocurrency holders could also become targets because North Korea uses hacking to generate foreign currency.

South Korea’s National Intelligence Service has said North Korea stole more than 2 trillion won, or about $1.4 billion, through cryptocurrency and other hacking operations targeting South Koreans and foreign virtual assets last year. The agency said it was the largest amount ever stolen by North Korean hackers.

North Korea is also believed to use cyberattacks to steal defense, information technology and other industrial technologies.

— Reported by Asia Today; translated by UPI

© Asia Today. Unauthorized reproduction or redistribution prohibited.

Original Korean report: https://www.asiatoday.co.kr/kn/view.php?key=20260514010003935

Source link

Google says hackers used AI to exploit ‘zero-day’ flaw

Google announced Monday that it identified a cyber threat it believes hackers developed using AI, meant to exploit networks on a large scale. File Photo by Sascha Steinbach/EPA

May 11 (UPI) — Google announced Monday that it identified a cyber threat it believes hackers developed using artificial intelligence, meant to exploit networks on a large scale.

Google Threat Intelligence Group said the hackers were using a zero-day exploit, a security vulnerability that is unknown to security companies, and planned to use it for mass exploitation.

Google said this is the first time it has identified a threat with evidence that AI was used to develop it.

“AI-enabled malware, such as PROMPTSPY, signal a shift toward autonomous attack orchestration, where models interpret system states to dynamically generate commands and manipulate victim environments,” Google Threat Intelligence Group said in a news release.

Google’s AI Gemini and Claude Mythos were highlighted as AI models it does not believe were used in this threat attempt.

If the threat was successful, hackers would have been able to bypass two-factor authentication on “a popular open-source, web-based system administration tool,” Google said. The attempt occurred within the last couple months but Google did not specify when exactly.

AI is also being used for cybersecurity, as a tool to identify potential security risks. Google says Monday’s report shows criminal hacker groups are also interested in using AI for their goals.

“For every zero-day we can trace back to AI, there are probably more out there,” John Hultquist, chief analyst at Google Intelligence Group, said in a statement. “Threat actors are using AI to boost the speed, scale, and sophistication of their attacks.

Source link

DOJ recovers millions of dollars in Colonial Pipeline ransom

The Justice Department recovered $2.3 million in cryptocurrency ransom that Colonial Pipeline paid to hackers whose cyberattack last month shut down its major East Coast pipeline, leading to gas shortages up and down the East Coast, authorities said.

Deputy Atty. Gen. Lisa Monaco said the FBI on Monday seized the majority of the ransom that Colonial Pipeline paid to hackers who used malware developed by DarkSide, a Russia-linked hacking group, to encrypt and lock up the company’s computer systems. The company, which Monaco credited with quickly alerting the FBI to the attack, said it paid the hackers $4.4 million in bitcoin to regain access to its systems.

“Today we turned the tables on DarkSide,” Monaco said, calling such ransomware attacks an “epidemic” that poses a “national security and economic threat” to the U.S. “This was an attack against some of our most critical infrastructure.”

Though the malware did not affect systems that operate the company’s pipelines, which stretch from New Jersey to Texas, Colonial discovered the hack on May 7 and closed its spigots for five days out of an abundance of caution. The pipeline supplies about 45% of the jet fuel, gasoline and heating oil consumed on the East Coast, and the shutdown sparked panic from drivers, who raced to top off tanks, leading gas stations to run out of fuel.

The Justice Department did not disclose how much Colonial paid in ransom, but the company’s chief executive told the Wall Street Journal last month that it made a $4.4-million payment in bitcoin. Colonial CEO Joseph Blount said the company paid the extortion demand because he was concerned a prolonged disruption of the pipeline would hurt the nation.

“I know that’s a highly controversial decision,” Blount told the newspaper. “I didn’t make it lightly. I will admit that I wasn’t comfortable seeing money go out the door to people like this.”

Ransomware hackers typically trick unwitting employees into opening an email and clicking on an attachment or a link, which then infects computer servers with malware that encrypts data and locks the systems. Victims must pay a ransom to the hackers to obtain a decryption key to unlock and recover the information. DarkSide’s malware poses a double whammy — it can also siphon out information, giving hackers more leverage because they can threaten to disclose sensitive data if they are not paid.

FBI Deputy Director Paul Abbate said DarkSide produces ransomware that it sells to hackers who conduct cyberattacks and share a percentage of their proceeds with the malware’s developers. DarkSide’s product is one of about 100 ransomware variants the FBI is investigating, Abbate said.

The bureau has been investigating DarkSide since last year, Abbate said, and has identified more than 90 victims of its ransomware in manufacturing, legal, insurance and healthcare industries. Working with other U.S. government agencies, the FBI identified “a virtual currency wallet” that the DarkSide hackers were using to collect payment from a victim, Abbate said.

The Justice Department then obtained a warrant to seize those bitcoins, officials said.

“The old adage ‘follow the money’ still applies,” said Monaco, the deputy attorney general. “That’s exactly what we do.”

The Colonial Pipeline attack was the latest in a series of ransomware assaults that has crippled government agencies, hospitals and businesses, including a major meat producer that was forced last week to idle plants, sparking concerns about potential increases in meat prices and shortages. A task force of more than 60 experts from industry, government and nonprofits issued a report in April that calls ransomware “a flourishing criminal industry that not only risks the personal and financial security of individuals, but also threatens national security and human life.”

The report, published by the nonprofit Institute for Security and Technology, estimates that nearly 2,400 governments, healthcare facilities and schools were victims of ransomware attacks last year. Ransom payments rose to $350 million last year, a 300% increase over 2019, the report says. The average such payment topped $300,000.

Cybersecurity experts and former federal prosecutors and agents blamed several trends for the increase. The rise of difficult-to-trace cryptocurrency has made it far easier for criminal gangs to collect payments, the experts said. Cybercriminals have also begun to increasingly operate within the borders of U.S. adversaries, particularly Russia. The Kremlin, for example, allows hackers to operate with impunity if they do not target Russian businesses or citizens and focus their energy on sowing chaos and confusion in the West.

The Biden administration is seeking to find ways to combat the rise. President Biden said he will discuss ransomware attacks this week with U.S. allies during a European trip, and bring up the subject during a June 16 meeting with Russian President Vladimir Putin. The Justice Department has launched a task force to better coordinate its approach to the crime wave. Justice Department officials said the Colonial Pipeline ransom seizure was the first such payment recovery by the task force. Justice Department officials could not say how many other ransoms they have recovered.

“This is a big deal,” said Scott Jasper, a lecturer at the Naval Postgraduate School and author of “Russian Cyber Operations: Coding the Boundaries of Conflict.” “The question is: Will this be big enough to change the behavior of DarkSide or of other cyber actors? It’s too early to tell. It’s a slow game, a long-term game. This is a significant, big business. This is a big enterprise.”

Source link