Hackers frequently target Facebook and MS Console due to the vast amount of personal and sensitive data they contain. Breaches in these systems allow threat actors to control user accounts, spread malware, and use these trusted platforms for extensive online attacks. Recently, cybersecurity researchers at Genians identified that the North Korean Kimsuky APT group has been exploiting these platforms for targeted attacks.
The Kimsuky APT group has devised a new social engineering tactic to target North Korean human rights activists by creating fake Facebook accounts impersonating South Korean officials. They used Facebook Messenger to establish authenticity and distribute malicious OneDrive links, delivering trojanized .msc files. This campaign utilized little-known attack vectors and shared infrastructure with previous attacks targeting Japan, highlighting the group’s evolving methods to infiltrate targets.
Despite using 60 anti-malware scanners, none detected the malicious files, underscoring the challenge of unknown patterns in cybersecurity. The attackers used decoy documents and repackaged parts masquerading as Microsoft Office and security applications, maintaining persistence through previously established Kimsuky campaigns. Their malware used VBScript to alter files and enable remote access, incorporating both old and new tactics to enhance their capabilities.
The first quarter of 2024 saw a surge in spear phishing and LNK malware attacks in Korea, with covert social media vectors being particularly effective. The GSC, in collaboration with Korea’s KISA and U.S. security experts, investigated these attacks and confirmed response capabilities through mock attacks and Genian EDR. These efforts led to swift analysis and countermeasures against the campaign, emphasizing the need for improved prevention solutions like behavior-based detection.
Reference: