iTnews

North Korean hackers use browser exploits to drop malware

By Juha Saarinen on Aug 18, 2021 12:48PM
North Korean hackers use browser exploits to drop malware

Malicious code disguised in legitimate code.

Security researchers have logged attacks from a known North Korean hacking group, targeting a limited number of victims with web browser exploits to drop a novel malware family onto computers.

The attackers, which security vendor Volexity named InkySquid, were able to use a strategic web compromise of a South Korean online new site, to inject malicious code on it.

An exploit from 2020 was used against visitors with MIcrosoft's Internet Explorer browser to load obfuscated Javascript code, which was hidden inside legitimate code.

Microsoft's legacy, first-generation Edge browser was also targeted in a similar fashion to above with a more recent recent exploit, which also worked with Internet Explorer.

In both cases, the Javascript was decrypted into a stager version of the Cobalt Strike penetration testing tool, followed by a secondary payload that Volexity has named BLUELIGHT.

BLUELIGHT is a new reconnaisance and information stealing malware family that the hackers had set up to use different cloud providers for command and control.

In the Korean attacks, Volexity found that Microsoft Graph application programming interface for Microsoft 365, Office and other services was used for BLUELIGHT operations.

Volexity attributed the InkySquid attacks to the InkySquid North Korean advanced persistent threat group which is also known as ScarCruft or APT37.

The hacking group has been active since 2012, targeting enterprises mainly in South Korea but also in other Asian countries and the Middle East.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
edgeinkysquidinternet explorermicrosoftnorth koreasecurity

Partner Content

Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Vast majority of surveyed firms still rely on password authentication
Promoted Content Vast majority of surveyed firms still rely on password authentication
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Juha Saarinen
Aug 18 2021
12:48PM
0 Comments

Related Articles

  • Careful you don't unwittingly hire North Korean IT freelancers
  • Microsoft security patches breaking authentication
  • Microsoft fixes remote code exec bug in Azure database connector
  • Heroku hackers got account passwords via OAuth token theft
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

Westpac promotes its head of technology to mortgage role

Westpac promotes its head of technology to mortgage role

Digital Nation

The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.