Wednesday, March 3, 2021
No Result
View All Result
Reelnewz
  • Home
  • Recent
  • Local
  • Global
  • Politics
  • Business
  • Defense
  • Health
  • Tech
  • Finance
  • Sport
  • Entertainment
  • Travel
  • Lifestyle
  • Home
  • Recent
  • Local
  • Global
  • Politics
  • Business
  • Defense
  • Health
  • Tech
  • Finance
  • Sport
  • Entertainment
  • Travel
  • Lifestyle
No Result
View All Result
Reelnewz
No Result
View All Result
Home Technology

Google: North Korean hackers have targeted security researchers via social media

1 month ago
in Technology
4 min read
Share on FacebookShare on Twitter


hooded-hackers-north-korea.jpg

Group of hooded hackers shining through a digital north korean flag cybersecurity concept


Michael Borgers, Getty Images/iStockphoto

Google said today that a North Korean government hacking group has targeted members of the cyber-security community engaging in vulnerability research.

The attacks have been spotted by the Google Threat Analysis Group (TAG), a Google security team specialized in hunting advanced persistent threat (APT) groups.

In a report published earlier today, Google said North Korean hackers used multiple profiles on various social networks, such as Twitter, LinkedIn, Telegram, Discord, and Keybase, to reach out to security researchers using fake personas.

Email was also used in some instances, Google said.

“After establishing initial communications, the actors would ask the targeted researcher if they wanted to collaborate on vulnerability research together, and then provide the researcher with a Visual Studio Project,” said Adam Weidemann, a security researcher with Google TAG.

The Visual Studio project contained malicious code that installed malware on the targeted researcher’s operating system. The malware acted as a backdoor, contacting a remote command and control server and waiting for commands.

New mysterious browser attack also discovered

But Wiedemann said that the attackers didn’t always distribute malicious files to their targets. In some other cases, they asked security researchers to visit a blog they had hosted at blog[.]br0vvnn[.]io (do not access).

Google said the blog hosted malicious code that infected the security researcher’s computer after accessing the site.

“A malicious service was installed on the researcher’s system and an in-memory backdoor would begin beaconing to an actor-owned command and control server,” Weidemann said.

But Google TAG also added that many victims who accessed the site were also running “fully patched and up-to-date Windows 10 and Chrome browser versions” and still got infected.

Details about the browser-based attacks are still scant, but some security researchers believe the North Korean group most likely used a combination of Chrome and Windows 10 zero-day vulnerabilities to deploy their malicious code.

As a result, the Google TAG team is currently asking the cyber-security community to share more details about the attacks, if any security researchers believe they were infected.

The Google TAG report includes a list of links for the fake social media profiles that the North Korean actor used to lure and trick members of the infosec community.

Security researchers are advised to review their browsing histories and see if they interacted with any of these profiles or if they accessed the malicious blog.br0vvnn.io domain.

nk-apt-twitter-profiles.png

Image: Google

In case they did, they are most likely to have been infected, and certain steps need to be taken to investigate their own systems.

The reason for targeting security researchers is pretty obvious as it could allow the North Korean group to steal exploits for vulnerabilities discovered by the infected researchers, vulnerabilities that the threat group could deploy in its own attacks with little to no development costs.

In the meantime, several security researchers have already disclosed on social media that they received messages from the attackers’ accounts, although, none have admitted to having systems compromised.

WARNING! I can confirm this is true and I got hit by @z0x55g who sent me a Windows kernel PoC trigger. The vulnerability was real and complex to trigger. Fortunately I only ran it in VM.. in the end the VMDK I was using was actually corrupted and non-bootable, so it self-imploded https://t.co/dvdCWsZyne

— Richard Johnson (@richinseattle) January 26, 2021





Source link

Previous Post

Helicopter safety bill pushed on eve of Kobe Bryant crash anniversary

Next Post

Pennsylvania Republican Jeff Pyle Deletes FB Page After Mocking Transgender Biden Cabinet Pick

Related Posts

Our stimulus check calculator can show you a personalized estimate of your check

by admin
2 hours ago
0

You can calculate how much money you and your family could expect with a $1,400 stimulus check maximum. Sarah...

How to block channels in Apple News – and try to keep them blocked

by admin
2 hours ago
0

It's supposed to be simple enough to tell Apple News that you don't want to read a particular channel...

Facebook can save itself by becoming a B Corporation – TechCrunch

by admin
2 hours ago
0

Ann Florini is Clinical Professor at Thunderbird School of Global Management at the Arizona State University. As Facebook confronts...

Japanese billionaire is looking for eight people to join him for a Moon voyage on SpaceX rocket

by admin
3 hours ago
0

Japanese billionaire Yusaku Maezawa invited the public on Tuesday to apply for a spot on SpaceX’s Starship in his...

Nearly every detail of the Oppo Find X3 Pro has surfaced in leaked videos

by admin
4 hours ago
0

Leaked videos appear to have confirmed virtually major detail of the Oppo Find X3 Pro.The flagship should include a...

Yubico and Microsoft want to finally kill off passwords for good

by admin
5 hours ago
0

Microsoft Azure Active Directory (Azure AD) users can now login without having to enter a password as Yubico has...

Load More
Next Post

Pennsylvania Republican Jeff Pyle Deletes FB Page After Mocking Transgender Biden Cabinet Pick

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent News

1 Injured In Shooting At East Metro Liquor Store – WCCO

March 3, 2021

Stock futures flat in overnight trading after Tuesday’s losses

March 3, 2021
[VIDEO] Pipeline Worker to Biden: “You Took My Livelihood From Me…I Can’t Start Over…”

[VIDEO] Pipeline Worker to Biden: “You Took My Livelihood From Me…I Can’t Start Over…”

March 3, 2021

Starz CEO Jeff Hirsch On Lionsgate, Summit Output Deal, OTT Sub Growth – Deadline

March 3, 2021

Arrest made in 1982 deaths of two young women near Breckenridge

March 3, 2021

Biden withdraws budget director nomination amid opposition | Politics News

March 3, 2021

Wife Of Top Cuomo Aide Shows Support On Social Media For Governor’s Latest Sexual Harassment Accuser – CBS New York

March 3, 2021

RHOP’s Ashley Darby, Husband Michael Welcome 2nd Child Together

March 3, 2021

Our stimulus check calculator can show you a personalized estimate of your check

March 3, 2021

Cole Sprouse’s Rumored Girlfriend Ari Fournier: 5 Things to Know

March 3, 2021
Reelnewz

All the latest breaking news on Reel Newz. Browse The Independent's complete collection of articles and commentary on Reel Newz.

Follow Us

Browse by Category

  • Business
  • Defense
  • Entertainment
  • Finance
  • Global
  • Health
  • Lifestyle
  • Local
  • Politics
  • Recent
  • Sport
  • Technology
  • Travel

Recent News

1 Injured In Shooting At East Metro Liquor Store – WCCO

March 3, 2021

Stock futures flat in overnight trading after Tuesday’s losses

March 3, 2021
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
  • Cookie Privacy Policy
  • Contact us

© 2020 All Rights Reserved - Reel Newz.

No Result
View All Result

© 2020 All Rights Reserved - Reel Newz.