in ,

US government goes all in to expose new malware used by North Korean hackers, Ars Technica

US government goes all in to expose new malware used by North Korean hackers, Ars Technica
    

      (NOT SO) HIDDEN COBRA –

             

Malicious wares are used in attacks to steal money and conduct other illegal activities.

      

      

Jung Yeon-Je / Getty Images

The US Pentagon, the FBI, and the Department of Homeland Security on Friday exposed a North Korean hacking operation and provided technical details for seven pieces of malware used in the campaign.

The US Cyber ​​National Mission Force, an arm of the Pentagon’s US Cyber ​​Command, said on Twitter that the malware is “currently used for phishing & remote access by [North Korean government] cyber actors to conduct illegal activity, steal funds & evade sanctions. ” The tweet linked to a post on VirusTotal , the Alphabet-owned malware repository, that provided cryptographic hashes, file names, and other technical details that can help defenders identify compromises inside the networks they protect.

Malware attributed to @ CISAgov

@DHS

– USCYBERCOM Malware Alert (@CNMF_VirusAlert) (February) ,

An accompanying advisory from the DHS’s Cybersecurity and Infrastructure Security Agency said the campaign was the work of Hidden Cobra, the government name for a hacking group sponsored by the North Korean Government. Many security researchers in the private sector use other names for the group, including Lazarus and Zinc. Six of the seven malware families were uploaded to VirusTotal on Friday. They included:

    Artfulpie, an “implant that performs downloading and in-memory loading and execution of DLL files from a hardcoded url ”

      Buttetline, another full- Featured implant, but this one uses fake a fake HTTPS scheme with a modified RC4 encryption cipher to remain stealthy

        Crowdedflounder, a Windows executable that’s designed to unpack and execute a Remote Access Trojan into computer memory

          But wait … there’s more

          Friday’s advisory from the Cybersecurity and Infrastructure Security Agency also provided additional details for the previously disclosed (Hoplight) , a family of files that act as a proxy-based backdoor. None of the malware contained forged digital signatures, a technique that’s standard among more advanced hacking operations that makes it easier to bypass endpoint security protections.

          Costin Raiu, director of the Global Research and Analysis Team at Kaspersky Lab, (posted an image on Twitter that showed the relationship between the malware detailed on Friday with malicious samples the Moscow-based security firm has identified in other campaigns attributed to Lazarus.

          Kaspersky Lab

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Justin Bieber's 'Changes' Album Is So Cringy It's Almost Adorable, Crypto Coins News

Justin Bieber's 'Changes' Album Is So Cringy It's Almost Adorable, Crypto Coins News

A Budget for a New Era of Space Exploration on This Week @NASA – February 14, 2020 – NASA, Youtube.com

A Budget for a New Era of Space Exploration on This Week @NASA – February 14, 2020 – NASA, Youtube.com