North Korean APT Groups
Lazarus Group (APT38)
Affiliation: North Korean government's Reconnaissance General Bureau
Activities: Known for the WannaCry ransomware attack, Sony Pictures hack, and targeting financial institutions, media organizations, aerospace, and defense industries. Active since 2009.
Targets: Financial institutions, media organizations, aerospace, defense industries.
TTPs (Tactics, Techniques, Procedures):
Spear-phishing campaigns: Spearphishing Attachment, Spearphishing Link, Spearphishing via Service
Use of custom malware: Malware
Exploiting software vulnerabilities: Exploitation for Privilege Escalation, Exploitation for Defense Evasion
Ransomware attacks: Ransomware
Lateral movement within networks: Lateral Movement
Notable Incidents:
WannaCry Ransomware Attack (2017): This global ransomware attack infected over 230,000 computers across 150 countries. It encrypted data and demanded ransom payments in Bitcoin. The attack caused significant disruption to various industries, including healthcare, finance, and transportation. Read more
Sony Pictures Hack (2014): Lazarus Group launched a devastating cyber attack on Sony Pictures, leading to the leak of confidential information, including unreleased films, employee data, and email communications. The attack was motivated by the planned release of the movie "The Interview." Read more
Operation Ghost (2013-2019): Lazarus Group targeted government networks in Europe and NATO member countries, using steganography to hide data within images. This long-running campaign involved persistent surveillance and data exfiltration. Read more
Kimsuky (APT43)
Affiliation: North Korean state-sponsored
Activities: Active since 2012, targeting diplomats, NGOs, think tanks, and experts on issues related to the Korean peninsula. Known for spear-phishing and cyber espionage.
Targets: Diplomats, NGOs, think tanks, experts on Korean peninsula issues.
TTPs:
Credential harvesting: Credential Dumping
Social engineering: Spearphishing via Service
Use of remote access tools (RATs): Remote Access Software
Data exfiltration: Exfiltration Over C2 Channel
Notable Incidents:
Campaigns against South Korean targets (2018): Kimsuky has been known to regularly target South Korean government and military entities, often through spear-phishing campaigns designed to steal sensitive information. Read more
South Korean Government Hack (2018): This attack targeted the South Korean government, stealing sensitive political and military information. It demonstrated Kimsuky's ability to compromise high-value targets through persistent efforts. Read more
South Korean Media Hack (2019): Kimsuky infiltrated South Korean media organizations, aiming to influence public opinion by spreading propaganda and misinformation. Read more
South Korean Defense Contractors Hack (2020): This incident involved targeting South Korean defense contractors to steal information related to military technologies, showcasing Kimsuky's focus on strategic intelligence gathering. Read more
Last updated