Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

TRANSLATEXT (Trojan) – Malware

January 22, 2025
Reading Time: 3 mins read
in Malware
TRANSLATEXT (Trojan) – Malware

TRANSLATEXT

Type of Malware

Trojan

Country of Origin

North Korea

Targeted Countries

South korea

Date of Initial Activity

2024

Associated Groups

APT43

Motivation

Cyberwarfare
Data Theft

Attack Vectors

Phishing

Type of Information Stolen

Browser Information
System Information
Login Credentials
Communication Data

Targeted Systems

Windows

Overview

In early 2024, the cybersecurity landscape witnessed the emergence of a sophisticated new threat known as TRANSLATEXT, attributed to the North Korean state-backed threat actor Kimsuky, also identified as APT43 or Velvet Chollima. Kimsuky, renowned for its targeted cyber espionage operations, has a history of focusing on South Korean entities, including government bodies, think tanks, and academic institutions. This latest campaign highlights the group’s continued evolution and adaptation in its cyber warfare tactics. TRANSLATEXT, disguised as a seemingly innocuous Google Chrome extension, is a testament to the threat actor’s ingenuity in blending into the digital ecosystem to achieve their malicious objectives. TRANSLATEXT was first detected in March 2024 when Zscaler ThreatLabz uncovered its deployment through a malicious Google Chrome extension uploaded to an attacker-controlled GitHub repository. This extension, masquerading as a legitimate Google Translate tool, is designed to exfiltrate sensitive information including email addresses, usernames, passwords, and browser cookies. The malware’s ability to capture browser screenshots further underscores its capability to gather comprehensive data from its victims. The use of TRANSLATEXT reflects Kimsuky’s strategic approach to cyber espionage, utilizing deceptive tactics to infiltrate and compromise targeted systems, specifically within the South Korean academic sector.

Targets

Individuals Educational Services

How they operate

The operation of TRANSLATEXT begins with its distribution method. The malware is delivered via a Google Chrome extension that masquerades as a legitimate translation tool. This extension is distributed through an attacker-controlled GitHub repository, a platform that adds a veneer of legitimacy to the distribution process. Once installed, the extension requests extensive permissions, including access to user data on all websites visited. This broad access is crucial for TRANSLATEXT’s functionality, as it allows the malware to monitor and capture sensitive information across various sites. Once activated, TRANSLATEXT deploys a series of JavaScript payloads that facilitate its core operations. The malware injects these scripts into the web pages the user visits, specifically targeting login forms and sensitive information fields. This injection process is designed to capture keystrokes, browser cookies, and form data, including usernames and passwords. By embedding these scripts into the user’s browser environment, TRANSLATEXT effectively bypasses traditional security defenses and collects data without raising immediate suspicion. An advanced feature of TRANSLATEXT is its ability to capture screenshots of the user’s browser activity. This capability enables the malware to record visual information from web sessions, including sensitive data that may not be directly accessible through text-based data exfiltration methods. Screenshots are particularly useful for capturing complex authentication processes or one-time passwords that may be difficult to extract through standard means. The malware’s communication mechanism is also noteworthy. TRANSLATEXT uses encrypted channels to transmit collected data back to its command-and-control (C2) servers. This encryption ensures that the exfiltrated data is protected from interception during transit. The C2 infrastructure is designed to handle large volumes of data, indicating the threat actor’s intent to gather extensive intelligence from compromised systems. In summary, TRANSLATEXT showcases a sophisticated blend of technical strategies aimed at infiltrating and extracting valuable data from targeted systems. Its deployment as a Chrome extension, combined with its use of script injection, data capture, and encrypted communication, highlights the evolving nature of cyber espionage tools. As such, understanding and defending against such advanced threats is essential for organizations and individuals seeking to protect their digital assets and sensitive information from state-sponsored adversaries.

MITRE Tactics and Techniques

Initial Access: Spear Phishing (T1193) Execution: PowerShell (T1059.001) Persistence: Browser Extensions (T1176) Privilege Escalation: None observed Defense Evasion: Obfuscated Files or Information (T1027) Credential Access: Input Capture (T1056.001) Collection: Data from Information Repositories (T1213) Exfiltration: Exfiltration Over Command and Control Channel (T1041) Impact: None observed
References:
  • Kimsuky deploys TRANSLATEXT to target South Korean academia
Tags: APT43GitHubGoogle ChromekimsukyMalwareNorth KoreaTRANSLATEXTTrojanVelvet ChollimaZscaler ThreatLabz
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Old Discord Links Now Lead To Malware

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

Coordinated Brute Force Hits Tomcat Manager

SmartAttack Uses Sound To Steal PC Data

Pentest Tool TeamFiltration Hits Entra ID

Subscribe to our newsletter

    Latest Incidents

    Cyberattack On Brussels Parliament Continues

    Swedish Broadcaster SVT Hit By DDoS

    Major Google Cloud Outage Disrupts Web

    AI Spam Hijacks Official US Vaccine Site

    DragonForce Ransomware Hits Philly Schools

    Erie Insurance Cyberattack Halts Operations

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial