Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/5/2015
06:30 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

North Korean Government Not Likely Behind Malware On Nation's Official News Site

Contrary to initial assumptions of North Korean government involvement, watering hole attack appears to be the work of external hackers -- and contains similarities to Darkhotel campaign, security researchers say.

A data-stealing malware program on North Korea’s official news site discovered earlier this year appears to have been planted there by external attackers -- not the government, as some originally had assumed.

Security researchers at Kasperksy Labs recently reviewed the Korea Central News Agency (KCNA) website and discovered that the malware is still active on the site’s main page. However, a closer examination of the illicit software suggests that the site’s developers did not plant it there.

Instead, the malware’s trigger mechanism, system requirements, and its similarities with software used in the more recent Darkhotel cyber espionage campaign point toward an external actor, says Juan Guerrero-Saade, senior security researcher with Kaspersky’s Global Research and Analysis Team.

In addition, the KCNA site itself was vulnerable to a cross-site scripting flaw right around the time the malware first surfaced on the site. So anyone could have planted the malware, not just the site’s government-sponsor.

Contrary to what many may have assumed, the malware also appears designed more to infect systems belonging to users in North Korea rather than visitors to the KCNA website from outside the country, Guerrero-Saade says.

“Because of what happened at Sony and because this was a North Korean site, many people had no trouble assuming North Korean involvement,” when the malware was originally discovered, he said.

A security researcher writing for InfoSecOtter (the site is currently unavailable) first reported news of the North Korean website being rigged with malware in January. The code, disguised as a Flash Player update, was apparently designed to infect systems of people visiting the website.

According to Guerrero-Saade, users attempting to view pictures or video contained in a section of KCNA’s front page are presented with a gif urging them to install Flash Player. Those clicking on the link are directed to a malicious zip file that drops two executable files masquerading as Flash Player updates on the user’s system.

Contrary to original perceptions, the malware does not infect all systems that visit the site. Instead, it only infects systems running Flash Player 10 or older versions. It ignores all computers featuring more modern versions of Flash Player. This suggests that the attackers behind the malware are targeting extremely outdated Windows PCs, such as those likely being used inside North Korea, Guerrero-Saade says.

Once installed on a computer, the malware gathers system information and passes it on to one of three command and control servers. It also scans removable drives and network shares for executable files to infect. The malware can be remotely configured to collect any information attackers want from the infected system.

Guerrero-Saade says the malware hosted on KCNA bears many similarities to the Darkhotel campaign. Just like Darkhotel, the KCNA info-stealer is highly selective about the systems it infects. At the same time, both malware tools are also designed to spread indiscriminately through other means. Both pieces of malware are designed to steal mostly the same information and maintain the stolen data in very similar formats. Both data stealers also use spoofed Flash Player updates and share several similarities in code.

Systems infected with the KCNA info stealer have been detected in China, Malaysia, Russia, South Korea, and Taiwan.

Guerrero-Saade says he is not sure why the malware has not been removed from the North Korean website, even though it has been several weeks since its presence was first disclosed. “It is definitely curious,” he says.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.