{"id":13806,"date":"2023-03-15T15:30:27","date_gmt":"2023-03-15T15:30:27","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=13806"},"modified":"2023-03-15T15:30:27","modified_gmt":"2023-03-15T15:30:27","slug":"north-korean-hackers","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/north-korean-hackers\/","title":{"rendered":"North Korean Hackers Attack Cybersecurity Specialists by Offering Them Jobs via LinkedIn"},"content":{"rendered":"<p><h4>Mandiant experts noticed that North Korean hackers have focused their attention and attacks on information security specialists. Attackers try to infect researchers with malware in the hope of infiltrating the networks of companies that the targets work for.<\/h4>\n<\/p>\n<p>Let me remind you that we also wrote that <a href=\"\/blogs\/heads-of-cybersecurity-departments\/\">Nearly 50% of Cybersecurity Leaders Will Change Jobs by 2025<\/a>, and also that <a href=\"\/blogs\/microsoft-accused-russia-and-north-korea-of-attacks-on-pharmaceutical-companies\/\"><strong>Microsoft<\/strong> accused Russia and North Korea of attacks on pharmaceutical companies<\/a>.<\/p>\n<p>The media also wrote that <a target=\"_blank\" href=\"https:\/\/adware.guru\/lazarus-and-the-harmony-hack\/\" rel=\"noopener nofollow\"><strong>FBI<\/strong> Links North Korean <strong>Lazarus<\/strong> Hackers to <strong>Harmony<\/strong> Hack and $100 Million Theft<\/a>.<\/p>\n<p><strong>Mandiant<\/strong> says it <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/www.mandiant.com\/resources\/blog\/lightshow-north-korea-unc2970\">first discovered the North Korean hacking campaign in June 2022<\/a> while tracking a phishing campaign targeting a US technology client. Then the hackers tried to infect the target with three new malware families (<strong>Touchmove<\/strong>, <strong>Sideshow<\/strong> and <strong>Touchshift<\/strong>).<\/p>\n<p>Shortly thereafter, there was a spate of attacks on American and European media by the <strong>UNC2970<\/strong> group, which Mandiant links to North Korea. For these attacks, UNC2970 used spear-phishing emails disguised as job offers in an attempt to coerce their targets into installing the malware.<\/p>\n<p>Researchers say that UNC2970 recently changed tactics and now switched from using phishing emails to using fake <strong>LinkedIn<\/strong> accounts allegedly owned by HR. Such accounts carefully imitate the identities of real people in order to deceive the victims and increase the chances of the attack being successful.<\/p>\n<p>After contacting the victim and making her an \u201cinteresting job offer\u201d, the attackers try to transfer the conversation to <strong>WhatsApp<\/strong>, and then use either the messenger itself or email to deliver the backdoor, which Mandiant called <strong>Plankwalk<\/strong>, as well as other malware families.<\/p>\n<p>Plankwalk and other malware in the group mainly use macros in Microsoft Word. When the document is open and macros are enabled, the target machine downloads and executes the malicious payload from the hackers&#8217; servers (mostly hacked <strong>WordPress<\/strong> sites). As a result, a ZIP archive is delivered to the target machine, which, among other things, contains a malicious version of the <strong>TightVNC<\/strong> remote desktop application that Mandiant monitors under the name <strong>LIDSHIFT<\/strong>.<\/p>\n<p>One of the documents used for the attacks can be seen below, where the hackers impersonate the <strong>New York Times<\/strong>.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/Job-Description.jpg\" alt=\"North Korean hackers\" title=\"\"><\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">The victim is told to launch the TightVNC application, whose name, along with other files, matches the company where the victim plans to be tested.<\/p>\n<p>Not only does TightVNC act as a legitimate remote desktop access tool, LIDSHIFT also contains many hidden features. The first is that once executed by the user, the malware sends a beacon to its hard-coded C&#038;C server. In this case, the only action that was required from the user was the launch of the program itself. This LIDSHIFT beacon contains the original username and hostname of the victim.<\/p>\n<p>The second feature of LIDSHIFT is to inject an encrypted DLL into memory. DLL is a trojanized Notepad++ plugin that functions as a loader and is tracked under the name <strong>LIDSHOT<\/strong>. LIDSHOT is injected as soon as the victim opens the dropdown in the TightVNC Viewer app.<\/p>\n<p>LIDSHOT performs two main functions: enumeration, as well as downloading and executing shellcode from the management server.<span class=\"su-quote-cite\">says the Mandiant report.<\/span><\/div><\/div>\n<p>As a result, Plankwalk paves the way for introducing additional tools to the target machine, including:<\/p>\n<ol>\n<li><strong>TOUCHHIFT<\/strong> is a dropper that downloads other malware, ranging from keyloggers and screenshot utilities to full-featured backdoors;<\/li>\n<li><strong>TOUCHSHOT<\/strong> &#8211; takes screenshots every three seconds;<\/li>\n<li><strong>TOUCHKEY<\/strong> &#8211; a keylogger that captures keystrokes and intercepts data from the clipboard;<\/li>\n<li><strong>HOOKSHOT<\/strong> is a tunneling tool that connects via TCP to communicate with the server management server;<\/li>\n<li>TOUCHMOVE &#8211; a loader designed to decrypt and execute a payload;<\/li>\n<li>SIDESHOW is an AC\/C++ backdoor that runs arbitrary commands and communicates via HTTP POST requests with its command and control server.<\/li>\n<\/ol>\n<p>It is also reported that UNC2970 used Microsoft Intune to manage endpoints and download a PowerShell script containing a payload in the form of a <strong>CLOUDBURST<\/strong> backdoor written in C. It is assumed that UNC2970 uses this legitimate application to bypass endpoint protection.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">Although the group has previously targeted the defense, media and technology industries, targeting security researchers suggests a change in strategy or expansion of UNC2970 activities.<span class=\"su-quote-cite\">the experts conclude.<\/span><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Mandiant experts noticed that North Korean hackers have focused their attention and attacks on information security specialists. Attackers try to infect researchers with malware in the hope of infiltrating the networks of companies that the targets work for. Let me remind you that we also wrote that Nearly 50% of Cybersecurity Leaders Will Change Jobs [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":13809,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[29,243,1086,94],"class_list":{"0":"post-13806","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-hackers","9":"tag-linkedin","10":"tag-mandiant","11":"tag-microsoft"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/North-Korean-hackers.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=13806"}],"version-history":[{"count":1,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13806\/revisions"}],"predecessor-version":[{"id":13808,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13806\/revisions\/13808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/13809"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=13806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=13806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=13806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}