Andariel | |
Other Names | Unknown |
Location | North Korea |
Date of initial activity | 2009 |
Suspected attribution | State-sponsored threat group |
Associated Groups | Lazarus Group, Silent Chollima |
Motivation | The group mainly attacked their victims in the early days to obtain information related to security, but their attacks eventually aimed for gaining financial profits. |
Associated tools | gh0st RAT, Andarat, Andaratm, Phandoor, Rifdoor, YamaBot, TigerRAT, MagicRat, Black RAT, Goat RAT, NukeSped, Dtrack, maui Ransomware, 1th Troy Reverse Shell, DurianBeacon, EarlyRat, MeshAgent. |
Active | Yes |
Overview
Andariel is a North Korean state-sponsored threat group that has been active since at least 2009. Andariel has primarily focused its operations–which have included destructive attacks–against South Korean government agencies, military organizations, and a variety of domestic companies; they have also conducted cyber financial operations against ATMs, banks, and cryptocurrency exchanges.
Andariel is considered a sub-set of Lazarus Group, and has been attributed to North Korea’s Reconnaissance General Bureau.
North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name Lazarus Group instead of tracking clusters or subgroups.
Common targets
Andariel group is one of the threat actor groups who are most actively targeting South Korea. Major target industries are those related to national security such as national defense, political organizations, shipbuilding, energy, and communications. Various other companies and institutes in Korea including universities, logistics, and ICT companies are also becoming attack targets.
Attack Vectors
The Andariel group is known to use attacks such as spear phishing attacks and watering hole attacks, and exploit software vulnerabilities to kick-start the initial access. There have also been cases in which the group exploited installed software or utilized vulnerability attacks to distribute their malware.
How they operate
During the initial compromise stage, the Andariel threat group usually employs spear phishing, watering hole, and supply chain attacks. Additionally, there are cases where the group abuses central management solutions during the malware installation process. A notable fact about the group is its creation and use of various malware types in its attacks.
The Andariel group installed a backdoor like how Kimsuky group did, took control of the infected systems, and performed additional tasks to remotely take control of their victims’ screens. There are many backdoor types, including Andarat, Andaratm, Phandoor, and Rifdoor used in the past attacks, as well as TigerRAT and MagicRAT which have been detected for the past few years.
MITRE ATT&CK Techniques used by Andariel:
- T1005 Data from Local System: Andariel has collected large numbers of files from compromised network systems for later extraction.
- T1189 Drive-by Compromise: Andariel has used watering hole attacks, often with zero-day exploits, to gain initial access to victims within a specific IP range.
- T1203 Exploitation for Client Execution: Andariel has exploited numerous ActiveX vulnerabilities, including zero-days.
- T1592.002 Gather Victim Host Information – Software: Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.
- T1590.005 Gather Victim Network Information – IP Addresses: Andariel has limited its watering hole attacks to specific IP address ranges.
- T1105 Ingress Tool Transfer: Andariel has downloaded additional tools and malware onto compromised hosts..
- T1027.003 Obfuscated Files or Information – Steganography: Andariel has hidden malicious executables within PNG files.
- T1588.001 Obtain Capabilities – Malware: Andariel has used a variety of publicly-available remote access Trojans (RATs) for its operations.
- T1566.001 Phishing – Spearphishing Attachment: Andariel has conducted spearphishing campaigns that included malicious Word or Excel attachments.
- T1057 Process Discovery: Andariel has used
tasklist
to enumerate processes and find a specific string. - T1049 System Network Connections Discovery: Andariel has used the
netstat -naop tcp
command to display TCP connections on a victim’s machine. - T1204.002 User Execution – Malicious File: Andariel has attempted to lure victims into enabling malicious macros within email attachments.
Significant Attacks
Andariel’s notable activity includes Operation Black Mine, Operation GoldenAxe, and Campaign Rifle.
References:
- Andariel
- Andariel Group Exploiting Korean Asset Management Solutions (MeshAgent)
- Analysis of Andariel’s New Attack Activities
- Andariel’s silly mistakes and a new malware family
- Andariel deploys DTrack and Maui ransomware
- Andariel evolves to target South Korea with ransomware
- New Andariel Reconnaissance Tactics Uncovered
- Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups
- Operation GoldenAxe
- Campaign Rifle