Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

1/26/2021
05:55 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

North Korean Attackers Target Security Researchers via Social Media: Google

Google TAG warns the infosec community of unsolicited requests from individuals seeking collaboration on vulnerability research.

Security experts focused on vulnerability research and development are targets of a social engineering campaign reportedly conducted by a North Korean government-backed entity, Google reports.

Related Content:

SonicWall Is Latest Security Vendor to Disclose Cyberattack

Special Report: Understanding Your Cyber Attackers

New From The Edge: Learn SAML: The Language You Don't Know You're Already Speaking

The Google Threat Analysis Group (TAG), which tracks advanced persistent threat operations, has been watching this attack unfold over the past several months. In a writeup of the findings, TAG security researcher Adam Weidemann says the attackers leveraged "a number of means" to target members of the security research community across multiple social media platforms. 

Researchers were contacted on Twitter, LinkedIn, Telegram, Discord, Keybase, and email. The attackers created several Twitter profiles, which they used to interact with researchers, share videos of claimed exploits, retweet other attacker-controlled accounts, and link to their blog. 

This "research blog" was created to establish credibility and connect with targets, Weidemann says, and the attackers used it to share writeups and analyses of vulnerabilities that had already been publicly disclosed. These included "guest posts" from legitimate and unknowing security researchers, likely shared in an attempt to build trust within the security research community. 

After establishing initial communications, the attackers would ask a targeted researcher if they wanted to work together on vulnerability research. The attackers would then would provide the researcher with a Visual Studio Project, which would contain source code for exploiting the vulnerability and an additional DLL that would be executed via Visual Studio Build Events. The DLL is custom malware that would begin to communicate with the attackers' command-and-control (C2) domains.

Some attackers didn't share infected files with targets; instead, they asked them to access a writeup hosted at a malicious link. Shortly after they clicked, a malicious service would be installed on the target system and an in-memory backdoor would beacon to the attackers' C2. TAG notes at the time this link was accessed, the victim systems were running patched and up-to-date versions of Windows 10 and Chrome. It cannot confirm the method of compromise.

Blending in With Security Researchers
While there is nothing especially novel about the attackers' social engineering techniques, what stands out is their prolonged investment in establishing credibility to connect with their targets. 

"They really spent significant effort building up a persona in the Western cybersecurity community," says Lesley Carhart, principal industrial incident responder with Dragos, who has been watching this unfold.

Trying to ingratiate with the community "is an effective tactic for adversaries," she adds. The attackers reached out to many members of the research community involved in vulnerability research, and they picked Twitter handles that resemble something a researcher might use. 

They also published several videos of published exploits. While TAG was unable to verify the authenticity or working status of all exploits attackers shared videos of, the team reports that at least one video fakes the success of an exploit the attackers claim is functional. Even though the exploit was fake, and multiple comments identified the video as fake, the attackers used some of their Twitter accounts to retweet their original post and claim that their video was authentic. 

A Wake-up Call for the Infosec Community
Carhart calls the incident "a shock to the system" for security researchers. Many experts in the community, in particular those focused on exploit development, work with a range of people — IT security practitioners, the media, and white-hat, gray-hat, and black-hat hackers — to stay on top of what's happening on the black market, how malware works, and what happens with it. 

"A lot of security researchers are really familiar, and comfortable with, having professional contacts and relationships with people from all swaths of legality," she says. "They're not used to being explicitly targeted through those." 

While researchers often work with students, people outside the United States, and those who are less law-abiding in their online activity, Carhart notes that some experts who were targeted had their suspicions when communicating with the attackers. Their English was poor, some said, and they were insistent in requesting data not typically shared outside the company.

"There was that aggressive pursuit for sensitive stuff, in poor English, without a prior relationship," she adds, and the combination was a red flag for some researchers. Those she knew who did download the file or click the link did so in a virtual machine; however, it is possible there are researchers who were compromised but haven't admitted it. We still don't know the full extent of this campaign.

We don't yet have enough data to know what the attackers were after, Carhart says, though there are many reasons why they'd want access to a researcher's machine. They may seek exploits that haven't been properly investigated or disclosed, or they could want access to organizations' vulnerability or assessment data. They may be targeting a researcher as a means to access another entity — a tactic often seen in social engineering campaigns, she notes.

"Sometimes the initial target is only a stepping stone to reach another computer, another person on a network," she adds.

Google TAG attributes the attack to a government entity based in North Korea; some security researchers have made the same connection. If that is the case, this activity would mark a shift in strategy for North Korea, which is primarily known for financially motivated cybercrime.

Security practitioners often build relationships with people they only know online, and this incident is a reminder to use caution when working with someone you don't know. If you're going to open files and links from strangers, they should be treated as untrustworthy and vetted or opened in a virtual machine.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20027
PUBLISHED: 2021-06-14
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
CVE-2021-32684
PUBLISHED: 2021-06-14
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, an...
CVE-2021-34693
PUBLISHED: 2021-06-14
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
CVE-2021-27887
PUBLISHED: 2021-06-14
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids ...
CVE-2021-27196
PUBLISHED: 2021-06-14
Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC 61850 network with knowledge of how to reproduce the...