Article Details

Scrape Timestamp (UTC): 2024-05-16 13:49:24.567

Source: https://thehackernews.com/2024/05/north-korean-hackers-exploit-facebook.html

Original Article Text

Click to Toggle View

North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign. The North Korea-linked Kimsuky hacking group has been attributed to a new social engineering attack that employs fictitious Facebook accounts to targets via Messenger and ultimately delivers malware. "The threat actor created a Facebook account with a fake identity disguised as a public official working in the North Korean human rights field," South Korean cybersecurity company Genians said in a report published last week. The multi-stage attack campaign, which impersonates a legitimate individual, is designed to target activists in the North Korean human rights and anti-North Korea sectors, it noted. The approach is a departure from the typical email-based spear-phishing strategy in that it leverages the social media platform to approach targets through Facebook Messenger and trick them into opening seemingly private documents written by the persona. The decoy documents, hosted on OneDrive, is a Microsoft Common Console document that masquerades as an essay or content related to a trilateral summit between Japan, South Korea, and the U.S. -- "My_Essay(prof).msc" or "NZZ_Interview_Kohei Yamamoto.msc" -- with the latter uploaded to the VirusTotal platform on April 5, 2024, from Japan. This raises the possibility that the campaign may be oriented toward targeting specific people in Japan and South Korea. The use of MSC files to pull off the attack is a sign that Kimsuky is utilizing uncommon document types to fly under the radar. In a further attempt to increase the likelihood of success of the infection, the file is disguised as an innocuous Word file using the word processor's icon. Should a victim launch the MSC file and consent to opening it using Microsoft Management Console (MMC), they are displayed a console screen containing a Word document that, when launched, activates the attack sequence. This involves running a command to establish a connection with an adversary-controlled server ("brandwizer.co[.]in") to display a document hosted on Google Drive ("Essay on Resolution of Korean Forced Labor Claims.docx"), while additional instructions are executed in the background to set up persistence as well as collect battery and process information. The gathered information is then exfiltrated to the command-and-control (C2) server, which is also capable of harvesting IP addresses, User-Agent strings, and timestamp information from the HTTP requests, and delivering relevant payloads as necessary. Genians said that some of the tactics, techniques, and procedures (TTPs) adopted in the campaign overlap with prior Kimsuky activity disseminating malware such as ReconShark, which was detailed by SentinelOne in May 2023. "In the first quarter of this year, spear phishing attacks were the most common method of APT attacks reported in South Korea," the company noted. "Although not commonly reported, covert attacks via social media are also occurring." "Due to their one-on-one, personalized nature, they are not easily detected by security monitoring and are rarely reported externally, even if the victim is aware of them. Therefore, it is very important to detect these personalized threats at an early stage."

Daily Brief Summary

MALWARE // North Korean Hackers Use Facebook Messenger for Malware Delivery

North Korea-linked Kimsuky hacking group conducts a malware campaign via Facebook Messenger using fictitious accounts.

Targets are deceived by fake profiles imitating public officials in the North Korean human rights sector.

Attack employs social engineering through private document shares on OneDrive, diverging from traditional email spear-phishing.

Decoy documents presented as academic and interview content related to diplomatic summits, hosted with misleading file types to bypass detection.

Upon opening the malicious document, a command sequence is triggered, connecting the victim's computer to a control server.

Collected data includes IP addresses, user details, and process information, which are sent to the adversary's server for further exploitation.

The malware campaign's techniques partially overlap with previous activities identified as part of Kimsuky's operations, indicating a continuation and evolution of their strategic cyber attacks.

Genians highlight the importance of early detection of such personalized and covert social media-based attacks, which often remain undetected by standard security measures.