Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

9/12/2017
01:30 PM
50%
50%

Why North Korean Actors May Be Targeting Cryptocurrencies

FireEye links North Korean cyberthieves to a recent spate of spearphishing attacks against South Korea.

North Korean cybercriminals may increasingly steal Bitcoins and other cryptocurrencies, following the sanctions imposed Monday by the United Nations Security Council over North Korea's persistent nuclear testing, according to a FireEye blog post.

The sanctions, which include capping North Korea's oil imports and banning the country's profitable textile export business, may fuel even more spearphishing attacks against South Korea's cryptocurrency exchanges and other nations' exchanges, FireEye asserts, as North Korean actors seek to fund the government's activities and the pocketbooks of the country's elite.

Last year, FireEye says it noticed North Korean actors shifting their focus from cyber espionage to crimes against traditional banks and financial institutions around the globe. That shift was likely the result of North Korean actors trying to raise funds for government's activities, according to FireEye.

But beginning in May, the security firm says it observed at least three incidents where North Korean actors targeted South Korean cryptocurrency exchanges. The cyberthieves attacked the personal email accounts of employees at the exchanges, and often used bogus tax-related messages as the lure, according to FireEye. The attacks used malware called PEACHPIT, which FireEye links to previous malware used by North Korean actors in last year's attacks against global banks and financial institutions.

Read more about the North Korean cryptocurrency attacks here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/18/2017 | 1:17:38 PM
Re: Sanctions
I think it says a lot about the seriousness of the global situation that China has agreed to adhere to such sanctions against its own economic interest.

Except *maybe* NoKo itself, NOBODY wants war here.
Manstar
50%
50%
Manstar,
User Rank: Apprentice
9/15/2017 | 4:57:17 AM
Re: https://192168ll.mobi/
Thank you for the article. It's time to agree on a complete cessation of attacks
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/13/2017 | 9:16:08 AM
Re: Sanctions
Don't think North Korea has to 'adhere" per se --- it is the rest of the world, inclusive of China, that has to adhere to the sanctions.  NKor wants to business with friends (not enemies) so their door is open to whomeve wants to buy their jun...k, eh, stuff and pay a good bit of money for it.  
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/13/2017 | 8:35:00 AM
Re: Sanctions
Thanks for the timeline. I concur with your prediction. Similar to the US-China treaty to stop hacking each other. It's hard to stop an actively utilized process.
Ratteau
50%
50%
Ratteau,
User Rank: Strategist
9/13/2017 | 7:36:49 AM
Re: Sanctions
It hasn't even been 2 full days since the UNSC passed them.  Its a bit early to tell.  Prediction: they won't.
RyanSepe
0%
100%
RyanSepe,
User Rank: Ninja
9/13/2017 | 7:25:51 AM
Sanctions
To the best of the UN's knowledge has North Korea been adhering to the sanctions placed on oil and textiles?
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15208
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
CVE-2020-15209
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
CVE-2020-15210
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
CVE-2020-15211
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
CVE-2020-15212
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...