Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
FBI Warns of Threat from North Korean APT
Facebook   X   LinkedIn   Email

FBI Warns of Threat from North Korean APT

May 12, 2024

A North Korean-linked APT (advanced persistent threat) group recently found and exploited an email vulnerability. Not exactly great news, but even worse, North Korea appears to be actively focused on finding ways to target the macOS. How it all plays out remains to be seen, but in the meantime, a look at this new vulnerability is a smart idea.

Documented in a joint advisory from the FBI, Department of State, and the National Security Agency (NSA), it warns of an issue with weak DMARC Security policies that allow a backdoor malware. The advisory does not point to a specific threat to MacOS, but there are known instances of one called SpectralBlur. Though the advisory warns all operating systems are at risk. Discovering SpectralBlur is further evidence that North Korean threat actors are laser-focused on exploiting the macOS, as well as other operating systems, by creating malware for targeted attacks.

SpectralBlur isn’t considered sophisticated malware, but it has its purpose. Attackers use it for common backdoor abilities like uploading and downloading files, deleting files, updating its configuration, and other directives from the command and control (C2) server. It also has ways of evading detection.

Last year, another macOS malware was also suspected linked to a North Korean-linked APT.

Advisory Notes Some Red Flags Flying

The following activities were noted as possible indications or behaviors of malicious cyber actors. They will sound familiar:

“Innocuous initial communication with no malicious links/attachments, followed by communications containing malicious links/documents, potentially from a different, seemingly legitimate, email address;  Email content that may include real text of messages recovered from previous victim engagement with other legitimate contacts; Emails in English that have awkward sentence structure and/or incorrect grammar; Emails or communications targeting victims with either direct or indirect knowledge of policy information, including U.S. and ROK government employees/officials working on North Korea, Asia, China, and/or Southeast Asia matters; U.S. and ROK government employees with high clearance levels, and members of the military; Email accounts that are spoofed with subtle incorrect misspellings of legitimate names and email addresses listed in a university directory or an official website; Malicious documents that require the user to click “Enable Macros” to view the document; Follow-up emails with a sense of urgency that within 2-3 days of initial contact something bad will happen if the target does not respond to the initial spear phishing email; Emails purporting to be from official sources but sent using unofficial email services, identifiable through the email header information being a slightly incorrect version of an organization’s domain.”

Avoiding APTs

There are ways to keep North Korean and other APTs at bay, starting with keeping all systems and software updated at all times. This includes applying patches as soon as available since they often fix security flaws. Also, make sure systems have anti-virus software installed to catch malware before it invades a system.

With North Korea in clear pursuit of macOS vulnerabilities, it’s reasonable to believe they’re not the only country with macOS in their crosshairs. For now, staying informed and with systems protected and up to date is smart protection from any nation-state attacker.

Advice to Organizations for Securing Email

This group is identified by authorities as APT43, also known as Kimsuky. The joint advisory recommends that organizations implement mitigations to improve the DMARC security policies.

Additional recommendations can be found in the advisory: JCSA-20240502-001.


Is Sideloading Worth The Risk Of Downloading Malware?

Your Security

Is Sideloading Worth The Risk Of Downloading Malware?

It’s been well-known that sideloading apps is a risky proposition. Just ask the 20 million Aptoide users who recently learned their personally identifiable information (PII) was posted online by a hacker. Aptoide, a popular third-party app “discovery platform” had its database hacked earlier this month. The cybercriminal behind the hack claims that in addition to the 20 million exposed data files, there’s an additional 19 million files in their possession. Whether that’s true or not remains a mystery for now, but the Aptoide incident shows (in a huge way) why app sideloading is risky at best and is not recommended by security professionals. READ FULL STORY

Online Scams The New Top Cybercrime With 73% Of All Attacks

Scams & Phishing

Online Scams The New Top Cybercrime With 73% Of All Attacks

Move over former top cybercrimes, there’s a new winner according to Group-IB experts who specialize in high-tech cybercrimes. Group-IB recently announced that online scams are now the number one type of cybercrime in the world today, with some referring to this as a “scamdemic.” Researchers found that in total, fraud now makes up 73% of all online attacks. There’s a definite need for users to be aware of these scams, how they can work and how prevalent they are. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...