Article Details
Scrape Timestamp (UTC): 2024-06-28 16:22:55.800
Source: https://thehackernews.com/2024/06/kimsuky-using-translatext-chrome.html
Original Article Text
Click to Toggle View
Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data. The North Korea-linked threat actor known as Kimsuky has been linked to the use of a new malicious Google Chrome extension that's designed to steal sensitive information as part of an ongoing intelligence collection effort. Zscaler ThreatLabz, which observed the activity in early March 2024, has codenamed the extension TRANSLATEXT, highlighting its ability to gather email addresses, usernames, passwords, cookies, and browser screenshots. The targeted campaign is said to have been directed against South Korean academia, specifically those focused on North Korean political affairs. Kimsuky is a notorious hacking crew from North Korea that's known to be active since at least 2012, orchestrating cyber espionage and financially motivated attacks targeting South Korean entities. A sister group of the Lazarus cluster and part of the Reconnaissance General Bureau (RGB), it's also tracked under the names APT43, ARCHIPELAGO, Black Banshee, Emerald Sleet, Springtail, and Velvet Chollima. In recent weeks, the group has weaponized a known security flaw in Microsoft Office (CVE-2017-11882) to distribute a keylogger and has used job-themed lures in attacks aimed at aerospace and defense sectors with an aim to drop an espionage tool with data gathering and secondary payload execution functionalities. "The backdoor, which does not appear to have been publicly documented before, allows the attacker to perform basic reconnaissance and drop additional payloads to take over or remotely control the machine," cybersecurity company CyberArmor said. It has given the campaign the name Niki. The exact mode of initial access associated with the newly discovered activity is currently unclear, although the group is known to leverage spear-phishing and social engineering attacks to activate the infection chain. The starting point of the attack is a ZIP archive that purports to be about Korean military history and which contains two files: A Hangul Word Processor document and an executable. Launching the executable results in the retrieval of a PowerShell script from an attacker-controlled server, which, in turn, exports information about the compromised victim to a GitHub repository and downloads additional PowerShell code by means of a Windows shortcut (LNK) file. Zscaler said it found the GitHub account, created on February 13, 2024, briefly hosting the TRANSLATEXT extension under the name "GoogleTranslate.crx," although its delivery method is presently unknown. "These files were present in the repository on March 7, 2024, and deleted the next day, implying that Kimsuky intended to minimize exposure and use the malware for a short period to target specific individuals," security researcher Seongsu Park said. TRANSLATEXT, which masquerades as Google Translate, incorporates JavaScript code to bypass security measures for services like Google, Kakao, and Naver; siphon email addresses, credentials, and cookies; capture browser screenshots; and exfiltrate stolen data. It's also designed to fetch commands from a Blogger Blogspot URL in order to take screenshots of newly opened tabs and delete all cookies from the browser, among others. "One of the primary objectives of the Kimsuky group is to conduct surveillance on academic and government personnel in order to gather valuable intelligence," Park said. Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.
Daily Brief Summary
Kimsuky, a North Korean hacking group, has deployed a malicious Google Chrome extension named TRANSLATEXT to steal sensitive data.
The extension targets South Korean academics specializing in North Korean affairs, harvesting emails, passwords, cookies, and browser screenshots.
This cyber espionage activity also involves exploiting a Microsoft Office vulnerability (CVE-2017-11882) to distribute a keylogger and deploy espionage tools in the aerospace and defense sectors.
The malicious files were initially delivered via a ZIP archive, disguised as historical content on the Korean military, which contains malware-triggering components.
Kimsuky utilizes spear-phishing and social engineering tactics to start the infection chain, further highlighted by the recent use of job-themed lures.
The threat actor manages to maintain control and execute secondary payloads through a backdoor tool named Niki, allowing deep access and control over compromised machines.
Stolen data and command retrievals are channeled through a GitHub account briefly used to host the TRANSLATEXT extension, which mimics a legitimate Google Translate extension.
The focus of Kimsuky's attacks emphasizes intelligence collection from governmental and academic figures, aligning with North Korea's strategic objectives to gather international intelligence.