Researchers have uncovered a sophisticated malware campaign named “Niki,” which is likely linked to North Korean hackers. The campaign specifically targets aerospace and defense companies using job description lures to deliver a multi-stage attack. Once executed, the malware installs a powerful backdoor on victim systems, allowing attackers to gain remote access, execute commands, and exfiltrate sensitive data.
The Niki malware campaign begins with a malicious file disguised as a job description from reputable companies like General Dynamics or Lockheed Martin. When opened, this file deploys and activates the primary backdoor payload, providing the attackers with extensive control over the compromised system. The backdoor employs sophisticated obfuscation techniques, including encrypted API names and custom communication protocols, to avoid detection.
Researchers have linked this campaign to the notorious Kimsuky group (also known as APT43) based on several indicators, such as the use of job description lures, targeting of the aerospace and defense sectors, and code similarities with previous Kimsuky malware. Evidence also suggests that the malware developers may have outsourced some of their capabilities to external developers, indicating a well-resourced and advanced operation.
The discovery of the Niki malware highlights the persistent and evolving cyber threat posed by North Korean actors, particularly against critical sectors like defense. Companies within these targeted industries are advised to implement robust security measures and remain vigilant against sophisticated phishing and malware attacks to safeguard their systems and data.
Reference: