North Korea suspected of hacking campaign against South Korea

Cyber attacks on South Korean institutions appear to hail from Northern neighbour, claims anti-virus firm.

An active campaign of espionage against South Korean research institutions is being waged by North Korea, according to an investigation by Kaspersky.

The IT security firm said the North, in a campaign named Kimsuky, is targeting think tanks in the country as well as two Chinese organisations.

The malicious samples we found are the early stage malware most often delivered by spear-phishing emails.

A total of eleven organisations have been the focus of attacks. They include the Sejong Institute, Korea Institute for Defense Analyses (KIDA), South Korea's Ministry of Unification, Hyundai Merchant Marine and the Supporters of Korean Unification, a non-government organisation.

"Partly because this campaign is very limited and highly targeted, we have not yet been able to identify how this malware is being distributed," said Dmitry Tarakanov, a lab expert at Kaspersky. "The malicious samples we found are the early stage malware most often delivered by spear-phishing emails."

The malware carries out keystroke logging, directory listing collection, remote control access and HWP document theft (related to the South Korean word processing application from the Hancom Office bundle, extensively used by the local government). The malware also only disables security tools from Korean security firm AhnLab, which is very popular in South Korea.

The dedicated programme within the malware designed for stealing HWP documents heavily suggest the acquisition of these documents is one of main objectives of the group.

Clues left by the malware point to the North Korean origin of the attackers, Kaspersky said. The profiles of the victims - South Korean universities conducting research on international affairs and producing defense policies for government, a national shipping company, and support groups for Korean unification - "speak for themselves", the firm said. Another clue was in the compilation path used by the malware that contained Korean characters.

"One might easily suspect that the attackers might be from North Korea," said Tarakanov. "The targets almost perfectly fall into their sphere of interest. On the other hand, it is not that hard to enter arbitrary registration information and misdirect investigators to an obvious North Korean origin."

Tarakanov said the malware was "a somewhat unsophisticated spy program that communicated with its master' via a public email server. This approach is rather inherent to many amateur virus-writers and these malware attacks are mostly ignored."

Featured Resources

How to choose an AI vendor

Five key things to look for in an AI vendor

Download now

The UK 2020 Databerg report

Cloud adoption trends in the UK and recommendations for cloud migration

Download now

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

Download now

The impact of AWS in the UK

How AWS is powering Britain's fastest-growing companies

Download now

Recommended

Ransomware criminals look to other hackers to provide them with network access
ransomware

Ransomware criminals look to other hackers to provide them with network access

17 Jun 2021
CVS Health data breach leaves a billion records exposed
data protection

CVS Health data breach leaves a billion records exposed

16 Jun 2021
Four in five ransomware victims suffer repeat attacks
ransomware

Four in five ransomware victims suffer repeat attacks

16 Jun 2021
Putin open to handing cyber criminals over to US
hacking

Putin open to handing cyber criminals over to US

14 Jun 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

16 Jun 2021
Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021
What is HTTP error 400 and how do you fix it?
Network & Internet

What is HTTP error 400 and how do you fix it?

16 Jun 2021