North Korea suspected of hacking campaign against South Korea

Cyber attacks on South Korean institutions appear to hail from Northern neighbour, claims anti-virus firm.

An active campaign of espionage against South Korean research institutions is being waged by North Korea, according to an investigation by Kaspersky.

The IT security firm said the North, in a campaign named Kimsuky, is targeting think tanks in the country as well as two Chinese organisations.

The malicious samples we found are the early stage malware most often delivered by spear-phishing emails.

A total of eleven organisations have been the focus of attacks. They include the Sejong Institute, Korea Institute for Defense Analyses (KIDA), South Korea's Ministry of Unification, Hyundai Merchant Marine and the Supporters of Korean Unification, a non-government organisation.

Advertisement - Article continues below
Advertisement - Article continues below

"Partly because this campaign is very limited and highly targeted, we have not yet been able to identify how this malware is being distributed," said Dmitry Tarakanov, a lab expert at Kaspersky. "The malicious samples we found are the early stage malware most often delivered by spear-phishing emails."

The malware carries out keystroke logging, directory listing collection, remote control access and HWP document theft (related to the South Korean word processing application from the Hancom Office bundle, extensively used by the local government). The malware also only disables security tools from Korean security firm AhnLab, which is very popular in South Korea.

The dedicated programme within the malware designed for stealing HWP documents heavily suggest the acquisition of these documents is one of main objectives of the group.

Clues left by the malware point to the North Korean origin of the attackers, Kaspersky said. The profiles of the victims - South Korean universities conducting research on international affairs and producing defense policies for government, a national shipping company, and support groups for Korean unification - "speak for themselves", the firm said. Another clue was in the compilation path used by the malware that contained Korean characters.

"One might easily suspect that the attackers might be from North Korea," said Tarakanov. "The targets almost perfectly fall into their sphere of interest. On the other hand, it is not that hard to enter arbitrary registration information and misdirect investigators to an obvious North Korean origin."

Tarakanov said the malware was "a somewhat unsophisticated spy program that communicated with its master' via a public email server. This approach is rather inherent to many amateur virus-writers and these malware attacks are mostly ignored."

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now


internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020
Server & storage

Broadberry CyberServe R182-Z90 review: Gigabyte’s EPYC gamble pays off handsomely

7 Jan 2020
Microsoft Windows

GCHQ warns against Windows 7 for email, banking

13 Jan 2020