The North Korea-linked threat actor Andariel has launched a series of cyber attacks targeting various sectors in South Korea using a newly discovered Golang-based backdoor named Dora RAT. These attacks, observed by the AhnLab Security Intelligence Center (ASEC), have impacted educational institutes, manufacturing firms, and construction businesses. Andariel’s tactics include exploiting vulnerable Apache Tomcat servers to distribute malware, particularly targeting systems running the 2013 version of Apache Tomcat.
ASEC’s report highlights the diverse arsenal employed by Andariel, incorporating keyloggers, infostealers, and proxy tools alongside the Dora RAT backdoor. These tools enable the threat actor to gain control over compromised systems and extract sensitive data. Notably, some instances of Dora RAT used in these attacks were signed with valid certificates from a UK software developer, indicating a level of sophistication in the attack infrastructure.
Andariel, part of the larger Lazarus Group, has a history dating back to at least 2008, operating in alignment with North Korea’s strategic interests. Specializing in spear-phishing, watering hole attacks, and exploitation of software vulnerabilities, Andariel demonstrates adaptability and persistence in targeting South Korean entities. As cybersecurity experts analyze these attacks, it underscores the ongoing threat posed by nation-state actors to critical infrastructure and underscores the need for collaborative efforts to enhance cyber defenses and safeguard against future incursions.