Cryptocurrency

North Korea launched a cyberattack using identities stolen from actual South Korean police officers investigating cybercrime.

In a press launch on Wednesday, South Korean cybersecurity agency ESTsecurity mentioned the assault was launched by hackers posing as investigators from a sure South Korean police’s Advanced Security Research Team.

The hackers used a PDF containing an official ID card with a photograph and actual title, the corporate mentioned.

The PDFs utilized by the hackers contained official ID card QR codes, images, names, departments, ranks, dates of delivery, and call numbers.

Basically, the hackers tried to keep away from suspicion of their targets by presenting the ID playing cards of actual police officers dealing with cybercrime.

Hackers additionally used police IDs within the 2017 assault. In that assault on a South Korean cryptocurrency change, the attackers posed as officers soliciting cooperation in making queries to registered customers. They used his PDF copy of the officer’s ID card and his contaminated Excel file titled “Bitcoin transaction details.xml”. An intensive investigation by the authorities concluded that the assault was launched by a North Korean hacking group.

According to the ESTsecurity Security Response Center (ESRC), the server instructions used within the newest assaults are the instructions used within the phishing assaults in opposition to the United Nations High Commissioner for Human Rights and the National Unity Advisory Board reported in February and May. and mentioned sample is identical. , Respectively.

This signifies that provided that North Korean hacking organizations have been behind earlier assaults, we are able to speculate that the newest phishing assault was additionally launched by North Korea.

An ID card containing the non-public data of a South Korean police officer. (EST Security)

In truth, ESRC’s evaluation recognized the newest assault because the work of a hacking group affiliated with North Korea’s Reconnaissance General Bureau.

An ESRC worker mentioned North Korea’s cybersecurity dangers are so excessive that hackers have “stole the identities of South Korean police officers and approached them boldly in search of their targets.”

“Above all, like a zero trust cybersecurity model that assumes you trust no one, you need to be constantly suspicious and raise your level of awareness and tension.”

The Zero Trust cybersecurity mannequin requires customers to belief nobody, even the consumer or gadget that goes by your safety system to entry your system. Assuming that each consumer or gadget poses a safety danger, the mannequin grants permissions after full validation.

Meanwhile, the officer whose ID was used within the assault really despatched a doc final month to a suspected sufferer of a cyberattack.

An worker of Unification Media Group, a corporation that broadcasts to North Korea, acquired an electronic mail final month warning that it could have been hacked by the chief in query. Analysis confirmed that the recordsdata hooked up to the e-mail have been clear and that an precise government had despatched the e-mail to solicit their cooperation.

The ID file could have leaked by one other police company that was already hacked. The hacker seems to have obtained ID card recordsdata and different supplies from a pc he already controls and used them in his newest assault.

For this cause, individuals who have exchanged emails with the police officers are at excessive danger of being attacked, so that they should be particularly cautious. They ought to rigorously look at the sender’s deal with, instantly verify with the opposite social gathering whether or not they have despatched related emails, and be vigilant for safety failures.

Please ship any feedback or questions concerning this text to dailynkenglish@uni-media.internet.

learn in korean

LEAVE A REPLY

Please enter your comment!
Please enter your name here