This hacking group is using previously unknown tools to target defence contractors

Hackers used previously unknown tools in a cyber espionage campaign targeting defence and aerospace companies in a social engineering and phishing campaign which is more widely targeted than first thought.

Researchers at McAfee first detailed Operation North Star earlier this year, but further analysis of reveals additional tactics and techniques of the campaign which has almost identical elements to Hidden Cobra – AKA The Lazarus Group – a hacking operation which the US government and others say is working out of North Korea on behalf of the government in Pyongyang.

The campaign is still based around spear-phishing emails and LinkedIn messages which pose as job recruitment messages in an effort to lure victims into opening malicious attachments. Hackers even used legitimate recruitment adverts and documents taken from popular US defence contractor websites to make the emails look more authentic.

But now additional analysis by McAfee has revealed how the attackers use two stages of malware implants. All targets are compromised with the first stage of malware, which allows attackers to gather data including disk information, free disk space, computer name and logged in username and process information.

The hackers analyse this information to determine if the victim is high value enough to continue to with an attack – if the victim isn’t deemed important enough, the machine is sidelined while the attackers focus on distributing a second stage malware to victims deemed more worthwhile of attention.

SEE: A winning strategy for cybersecurity (ZDNet special report) | Download the report as a PDF (TechRepublic)

The second stage uses a previously known implant called Torisma, a custom-developed tool focused on specialised monitoring of high value victims’ systems, looking to gain access to login credentials and remote desktop sessions – all while remaining undetected.

“What is clear is that the campaign’s objective was to establish a long-term, persistent espionage campaign focused on specific individuals in possession of strategically valuable technology from key countries around the world,” McAfee researchers said in a blog post.

For Operation North Star, this meant researching specific target victims and created custom content to lure victims in, then infecting them with malware in an effort to commit espionage.

Initial reporting of the campaign detailed attacks against targets in the US, but those weren’t the only ones hackers were looking to compromise – analysis of the attacks has revealed that defence and technology contractors in Israel, Russia, India and Australia have also been targeted by this campaign.

“The actors behind the campaign were more sophisticated than they initially appeared. They are focused and deliberate in what they meant to achieve and more disciplined and patient in executing to achieve their objective,” said researchers.

Cyber espionage isn’t the only form of cyber attacks that North Korea is involved in; hackers working on behalf of Pyongyang regularly steal cryptocurrency to get around internatioanl sanctons. North Korea was also blamed for the WannaCry ransomware outbreak.


Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *