Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/5/2015
06:30 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

North Korean Government Not Likely Behind Malware On Nation's Official News Site

Contrary to initial assumptions of North Korean government involvement, watering hole attack appears to be the work of external hackers -- and contains similarities to Darkhotel campaign, security researchers say.

A data-stealing malware program on North Korea’s official news site discovered earlier this year appears to have been planted there by external attackers -- not the government, as some originally had assumed.

Security researchers at Kasperksy Labs recently reviewed the Korea Central News Agency (KCNA) website and discovered that the malware is still active on the site’s main page. However, a closer examination of the illicit software suggests that the site’s developers did not plant it there.

Instead, the malware’s trigger mechanism, system requirements, and its similarities with software used in the more recent Darkhotel cyber espionage campaign point toward an external actor, says Juan Guerrero-Saade, senior security researcher with Kaspersky’s Global Research and Analysis Team.

In addition, the KCNA site itself was vulnerable to a cross-site scripting flaw right around the time the malware first surfaced on the site. So anyone could have planted the malware, not just the site’s government-sponsor.

Contrary to what many may have assumed, the malware also appears designed more to infect systems belonging to users in North Korea rather than visitors to the KCNA website from outside the country, Guerrero-Saade says.

“Because of what happened at Sony and because this was a North Korean site, many people had no trouble assuming North Korean involvement,” when the malware was originally discovered, he said.

A security researcher writing for InfoSecOtter (the site is currently unavailable) first reported news of the North Korean website being rigged with malware in January. The code, disguised as a Flash Player update, was apparently designed to infect systems of people visiting the website.

According to Guerrero-Saade, users attempting to view pictures or video contained in a section of KCNA’s front page are presented with a gif urging them to install Flash Player. Those clicking on the link are directed to a malicious zip file that drops two executable files masquerading as Flash Player updates on the user’s system.

Contrary to original perceptions, the malware does not infect all systems that visit the site. Instead, it only infects systems running Flash Player 10 or older versions. It ignores all computers featuring more modern versions of Flash Player. This suggests that the attackers behind the malware are targeting extremely outdated Windows PCs, such as those likely being used inside North Korea, Guerrero-Saade says.

Once installed on a computer, the malware gathers system information and passes it on to one of three command and control servers. It also scans removable drives and network shares for executable files to infect. The malware can be remotely configured to collect any information attackers want from the infected system.

Guerrero-Saade says the malware hosted on KCNA bears many similarities to the Darkhotel campaign. Just like Darkhotel, the KCNA info-stealer is highly selective about the systems it infects. At the same time, both malware tools are also designed to spread indiscriminately through other means. Both pieces of malware are designed to steal mostly the same information and maintain the stolen data in very similar formats. Both data stealers also use spoofed Flash Player updates and share several similarities in code.

Systems infected with the KCNA info stealer have been detected in China, Malaysia, Russia, South Korea, and Taiwan.

Guerrero-Saade says he is not sure why the malware has not been removed from the North Korean website, even though it has been several weeks since its presence was first disclosed. “It is definitely curious,” he says.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-8033
PUBLISHED: 2020-08-14
In Textpattern 4.5.7, the password-reset feature does not securely tether a hash to a user account.
CVE-2020-15692
PUBLISHED: 2020-08-14
In Nim 1.2.4, the standard library browsers mishandles the URL argument to browsers.openDefaultBrowser. This argument can be a local file path that will be opened in the default explorer. An attacker can pass one argument to the underlying open command to execute arbitrary registered system commands...
CVE-2020-15693
PUBLISHED: 2020-08-14
In Nim 1.2.4, the standard library httpClient is vulnerable to a CR-LF injection in the target URL. An injection is possible if the attacker controls any part of the URL provided in a call (such as httpClient.get or httpClient.post), the User-Agent header value, or custom HTTP header names or values...
CVE-2020-15694
PUBLISHED: 2020-08-14
In Nim 1.2.4, the standard library httpClient fails to properly validate the server response. For example, httpClient.get().contentLength() does not raise any error if a malicious server provides a negative Content-Length.
CVE-2015-8032
PUBLISHED: 2020-08-14
In Textpattern 4.5.7, an unprivileged author can change an article's markup setting.