APT43 Group Uses Cybercrime to Fund North Korean Espionage Operations
Julian Strong MSc MBCS MIScT AMIET
Experienced Railway Signalling DPE/SPE/CEM/CRE inc. CSM-RA. High Speed Lines, Mainline rail and Mass Transit Systems.
Date: 29th May 2023
Location: Worldwide
Parties involved: APT43 Threat Actor, North Korea, South Korea, the U.S., Japan, Europe, Mandiant, Google
What happened: Google owned Mandiant has identified a shift threat APT43 method of operation. Manidant has placed a high confidence level that APT43 actions support the interest of North Korea and centre around social engineering and credential harvesting for both financial and espionage purposes.? APT43 had previously concentrated efforts on targeting health related entities and also pharma companies, they have now switched to conduct targeted operations against government, education, research, geopolitical and nuclear think tanks, business services and manufacturing. APT43 have conducted attacks with what have been described as ‘moderately sophisticated technical capabilities’ but using aggressive social engineering methods against South Korean and U.S.-based government organisations, academics, and think tanks focused on Korean peninsula geopolitical issues. It also believed that APT43 has engaged in collaborative efforts with other North Korean operators and on multiple occasions, reinforcing the importance of APT43 in the regime's cyber threat operations strategy. APT43 operate primarily spear phishing attacks which they underpin with spoofed domains and email addresses as part of social engineering attack strategy, these spoof domains are then used for credential harvesting.
APT43 then also used the compromised site to deliver additional malware to additional targets and harvest further credentials. They have also moved into targeting both cryptocurrency and related services in order to launder any illegitimately obtained crypto. The group has chosen to implement publicly available malware such as gh0st RAT, QUASARRAT, PENCILDOWN and AMADEY but it is mainly known for using LATEOP.
Analysis:?
领英推荐
Recommendations:
Sources
The Hacker News, 29th March 2023, North Korean APT43 Group Uses Cybercrime to Fund Espionage Operations, https://thehackernews.com/2023/03/north-korean-apt43-group-uses.html
Mandiant - Threat Intelligence Report, March 2023, APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations, https://mandiant.widen.net/s/zvmfw5fnjs/apt43-report
This article was written by Richard Flood & Julian Strong.