Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Here's How North Korean Hackers Stole Data From Isolated Network Segment
securityweek.com ^ | 2/25/2021 | ionut

Posted on 02/26/2021 6:29:49 PM PST by bitt

During an attack on the defense industry, the North Korea-linked threat group known as Lazarus was able to exfiltrate data from a restricted network segment by taking control of a router and setting it up as a proxy server.

For initial access, the group used phishing emails featuring COVID-19 themes and containing publicly available personal information of the intended victims. Next, they focused on credential harvesting and lateral movement, including gaining access to and exfiltrating data from restricted network segments.

Active since at least 2009, Lazarus has orchestrated multiple high-profile attacks. In 2019, they focused on crypto-currency exchanges, but switched to targeting COVID-19 research in 2020, including vaccine maker Pfizer. The group has also targeted security researchers, Google warned recently.

In a report this week, Kaspersky said Lazarus had been targeting the defense industry since at least mid-2020 using a malware cluster it named ThreatNeedle, which is an advanced cluster of the Manuscrypt malware (also known as NukeSped).

Through the use of spear-phishing, the attackers attempted to lure victims into opening a malicious Microsoft Office document and enabling macros to run, with multiple emails being delivered during the last two weeks of May 2020.

In early June, one malicious attachment was opened, providing the hackers with remote control of the system. The ThreatNeedle backdoor was deployed onto the victim’s system, allowing the adversary to perform reconnaissance and deploy additional payloads.

(Excerpt) Read more at securityweek.com ...


TOPICS: Crime/Corruption; Extended News; Foreign Affairs; Government
KEYWORDS: backtothestoneage; bitcoin; covid19; cybersecurity; hackers; nkorea; norks; northkorea; northkorean; pyongyang; threatneedle

1 posted on 02/26/2021 6:29:49 PM PST by bitt
[ Post Reply | Private Reply | View Replies]

To: ShadowAce; dayglored; Whenifhow; null and void; aragorn; EnigmaticAnomaly; kalee; Kale; ...

p


2 posted on 02/26/2021 6:30:19 PM PST by bitt (There are at least 74 MILLION furious and frustrated voters out there.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

Clever little buggers. Not surprised they have nukes & missiles to deliver them.


3 posted on 02/26/2021 6:35:52 PM PST by Trumpisourlastchance
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

People need to stop opening emails from senders they do not know or are not expecting email from. Come on, man!


4 posted on 02/26/2021 6:47:12 PM PST by Fury
[ Post Reply | Private Reply | To 2 | View Replies]

To: bitt

Wasn’t much of a “restricted network segment” if operators had access to email or the internet...


5 posted on 02/26/2021 6:48:55 PM PST by rockrr ( Everything is different now...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fury

And am not a big fan of running a router on a server. Get purpose built hardware for routing. More expensive, but the different underlying OS can provide some measure of attack surface “fragmentation”.


6 posted on 02/26/2021 6:49:48 PM PST by Fury
[ Post Reply | Private Reply | To 4 | View Replies]

To: rockrr

Agreed. We have VLANs where there is no off prem traffic allowed. That’s always a good practice if things are really meant to be “restricted”.


7 posted on 02/26/2021 6:53:11 PM PST by Fury
[ Post Reply | Private Reply | To 5 | View Replies]

To: Fury

I don’t think you read that right.

They put a small proxy server into the standalone router. It’s easy to do to your own home router with alternate firmware.


8 posted on 02/26/2021 6:58:21 PM PST by ConservativeMind (Trump: Befuddling Democrats, Republicans, and the Media for the benefit of the US and all mankind.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: ConservativeMind

I think that router was a Linux server running CentOS.


9 posted on 02/26/2021 7:01:51 PM PST by Fury
[ Post Reply | Private Reply | To 8 | View Replies]

To: bitt

Have y’all noticed that ALL comments on YouTube have been disabled? You can’t comment on a bread-making video. Completely shut down. Across the platform.


10 posted on 02/26/2021 7:20:28 PM PST by ALASKA (Trump will win resoundingly, but it's not going to be pretty. )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ConservativeMind

I think that router was a Linux server running CentOS.


11 posted on 02/26/2021 7:42:11 PM PST by Fury
[ Post Reply | Private Reply | To 8 | View Replies]

To: Fury
People need to stop opening emails from senders they do not know or are not expecting email from.

HR has diversity goals to meet, ya know--that is much more important than hiring intelligent employees.
12 posted on 02/26/2021 10:44:15 PM PST by cgbg (A kleptocracy--if they can keep it. Think of it as the Cantillon Effect in action.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ALASKA
Have y’all noticed that ALL comments on YouTube have been disabled? You can’t comment on a bread-making video. Completely shut down. Across the platform.

Yeah, I wonder what's going on with that?
13 posted on 02/27/2021 4:45:59 AM PST by farming pharmer (fork you :(){ :|:& };:)
[ Post Reply | Private Reply | To 10 | View Replies]

To: ALASKA

I posted a reply on a music channel just a minute ago.


14 posted on 02/27/2021 9:21:30 AM PST by RitchieAprile (available monkeys looking for the change..)
[ Post Reply | Private Reply | To 10 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson