FBI thwarts Lazarus-linked North Korean surveillance malware

The malware strain was discovered by the FBI and DHS and some say it's an attack on North Korea's economy

Image concept depicting North Korean malware

A malware strain dubbed ELECTRICFISH has been uncovered and is believed to be linked to North Korean hacker group Lazarus.

Discovered through a joint analysis operation conducted between the Federal Bureau of Investigation (FBI) and the Department of Homeland Security (DHS), ELECTRICFISH steals information from infected systems and feeds it back to a designated server.

Advertisement - Article continues below

The malware seems to be geared more towards surveillance as the main purpose is to implement "a custom protocol that allows traffic to be funnelled between a source and a destination Internet Protocol (IP) address", according to the Malware Analysis Report (MAR) issued by the government bodies.

The malware was discovered while tracking the group, referred to as HIDDEN COBRA in the MAR, but the same group also goes by the names Lazarus, Guardians of Peace and ZINC - the group responsible for many cyber attacks and heists including WannaCry.

The malware works by implementing a custom protocol and is then configured with a proxy server/port and proxy username and password,and according to the report: "This feature allows connectivity to a system sitting inside of a proxy server, which allows the actor to bypass the compromised system's required authentication to reach outside of the network." 

Advertisement
Advertisement - Article continues below

A proxy server is used on the internet to act as a gateway between user and web page. The server provides a firewall and web filter to protect against threats but ELECTRICFISH avoids the proxy server by directly connecting to the victim's IP address, allowing the hacker to exfiltrate information and web traffic.

The FBI and DHS have decided to distribute the MAR "to enable network defence and reduce exposure to North Korean government malicious cyber activity".

Advertisement - Article continues below

Sam Curry, chief security officer at Cybereason offers a different view. He thinks the distribution of the MAR is due to economic factors, trying to stifle any income the North Koreans may be getting from this allegedly state-sponsored attack.

"The government released information on the malware so that the North Koreans won't be able to continue using and monetising it - it's like cutting the head off a snake," he said. "As a country, North Korea is a very poor nation and their nation-state hacking capabilities help to fund budgets."

The MAR outlines some next steps for system administrators to follow to ensure their systems are protected from the ELECTRICFISH malware.

Aside from the usual update your antivirus, enforce strong password practises and update your OS guidelines, the report suggested admins also enable personal firewalls on an organisation's computers, configuring to deny unsolicited connection requests.

Admins should also disable any unnecessary services on workstations, scan for suspicious email attachments and scan all software downloaded from the web.

Advertisement

Recommended

Visit/security/cyber-security/355185/165-million-britons-experienced-a-cyber-crime-in-the-past-year
cyber security

Report: 16.5 million Britons fell victim to cyber crime in the past year

1 Apr 2020
Visit/cloud/amazon-web-services-aws/355183/aws-launches-amazon-detective
Amazon Web Services (AWS)

AWS launches Amazon Detective for investigating security incidents

1 Apr 2020
Visit/security/privacy/355182/government-to-launch-coronavirus-contact-tracking-app
privacy

UK government to launch coronavirus 'contact tracking' app

1 Apr 2020
Visit/software/video-conferencing/355180/zoom-does-not-use-end-to-end-encrypted
video conferencing

Zoom admits meetings don't use end-to-end encryption

1 Apr 2020

Most Popular

Visit/security/cyber-security/355200/spacex-bans-the-use-of-zoom
cyber security

Elon Musk's SpaceX bans Zoom over security fears

2 Apr 2020
Visit/development/application-programming-interface-api/355192/apple-buys-dark-sky-weather-app-and-leaves
application programming interface (API)

Apple buys Dark Sky weather app and leaves Android users in the cold

1 Apr 2020
Visit/data-insights/data-management/355170/oracle-cloud-courses-are-free-during-coronavirus-lockdown
data management

Oracle cloud courses are free during coronavirus lockdown

31 Mar 2020