IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

North Korean hackers target security researchers with fake social media accounts

Cyber spies also set up fake Turkish security website to entice victims

North Korean hackers that targeted security researchers back in January have returned in a new attack using fake Twitter and LinkedIn social media accounts.

According to researchers at Google's Threat Analysis Group (TAG), the hackers set up a new website with associated social media profiles for a fake company called “SecuriElite” on March 17.

This fake website claimed it was “an offensive security company located in Turkey that offers pentests, software security assessments and exploits”.

The website had a link to the hackers’ PGP public key at the bottom of the page. Earlier this year, researchers reported that the PGP key hosted on the attacker’s blog acted as the lure to visit the site where a browser exploit was waiting to be triggered.

Google researchers said they hadn’t seen this new fake website serving malicious content but have added it to Google Safebrowsing as a precaution.

The hackers set up several social media accounts to pose as fellow security researchers interested in exploitation and offensive security. Researchers said that on LinkedIn, two accounts were identified as impersonating recruiters for antivirus and security companies. Since then, these profiles have been reported to the relevant social media companies to take appropriate action.

Google’s Threat Analysis Group's Adam Weidemann said his team believes that these actors are dangerous and likely have more zero-days based on their activity.

"We encourage anyone who discovers a Chrome vulnerability to report that activity through the Chrome Vulnerabilities Rewards Program submission process,” he added.

In January, Google’s Threat Analysis Group identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations. This campaign was run by the Lazarus APT group closely linked to the North Korean regime. 

In this previous attack, hackers set up a research blog and multiple Twitter profiles to interact with potential targets to build credibility and connect with security researchers. These hackers used Twitter profiles to post links to their blog and videos of their claimed exploits, and amplify and retweet posts from other accounts they controlled.

As reported by ITPro, the Lazarus APT group has also used spear-phishing attacks targeting defense industry companies. Victims received emails with malicious Word attachments or links to them hosted on company servers. Malware in these emails gave hackers full control of the victim’s device.

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Mastering endpoint security implementation
Security

Mastering endpoint security implementation

18 May 2022
The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

4 May 2022
Dell Technologies World 2022: Dell unveils security offerings for major cloud providers
public cloud

Dell Technologies World 2022: Dell unveils security offerings for major cloud providers

3 May 2022

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Researchers demonstrate how to install malware on iPhone after it's switched off
Security

Researchers demonstrate how to install malware on iPhone after it's switched off

18 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022