Google says North Korea-backed hackers sought cyber research


While the country has denied involvement, North Korea has been linked to major cyberattacks, including a 2013 campaign that paralysed the servers of South Korean financial institutions, the 2014 hacking of Sony Pictures, and the WannaCry malware attack of 2017. — AFP Relaxnews

SEOUL, South Korea: Google says it believes hackers backed by the North Korean government have been posing as computer security bloggers and using fake accounts on social media while attempting to steal information from researchers in the field.

Google didn’t specify how successful the hackers were or what kind of information could have been compromised. Experts say the attacks reflect North Korean efforts to improve its cyber skills and be able to breach widely used computer products, such as Google’s Chrome Internet browser and Microsoft’s Windows 10 operating system.

While the country has denied involvement, North Korea has been linked to major cyberattacks, including a 2013 campaign that paralysed the servers of South Korean financial institutions, the 2014 hacking of Sony Pictures, and the WannaCry malware attack of 2017.

The UN Security Council in 2019 estimated North Korea earned as much as US$2bil (RM8.08bil) over several years through illicit cyber operations targeting cryptocurrency exchanges and other financial transactions, generating income that is harder to trace and offsets capital lost to US-led economic sanctions over its nuclear weapons program.

Adam Weidemann, a researcher from Google’s Threat Analysis Group, said in the online report published late Monday that hackers supposedly backed by North Korea created a fake research blog and multiple Twitter profiles to build credibility and interact with the security researchers they targeted.

After connecting with researchers, the hackers would ask them if they wanted to collaborate on cyber-vulnerability research and share a tool that contained a code designed to install malicious software on the targets’ computers, which would then allow the hackers to control the device and steal information from it.

Several targeted researchers were compromised after following a Twitter link to a blog set up by the hackers, Weidemann said.

“At the time of these visits, the victim systems were running fully patched and up-to-date Windows 10 and Chrome browser versions,” Weidemann wrote. “At this time we’re unable to confirm the mechanism of compromise, but we welcome any information others might have.”

Google published a list of social media accounts and websites it said were controlled by the hackers, including 10 Twitter profiles and five LinkedIn profiles.

Simon Choi, a senior analyst at NSHC, a South Korean computer security firm, said cyberattacks linked to North Korea over the past few years have demonstrated an improving ability in identifying and exploiting vulnerabilities in computer security systems. Before 2016, the North Koreans had mainly relied on methods used by Chinese or Russian hackers, he said.

“It’s notable that the computer security experts on Twitter who said they were approached by the hackers had been engaged in vulnerability research for Chrome and Windows 10,” Choi said.

“It’s that not easy to successfully penetrate these systems that are built with the latest security technologies. For the North Koreans, it makes more sense to steal the vulnerabilities already discovered by the researchers because developing their own ways to exploit these systems is harder.”

In 2018, US federal prosecutors charged a computer programmer working for the North Korean government for his alleged involvement in the cyberattacks that hacked Sony Pictures and unleashed the WannaCry ransomware virus. Park Jin Hyok, who is believed to be in North Korea, conspired to conduct attacks that also stole US$81mil (RM327.60mil) from Bangladesh’s central bank, according to the charges.

The 2014 Sony hack led to the release of tens of thousands of confidential Sony emails and business files. The WannaCry cyberattack in 2017 scrambled data on hundreds of thousands of computers at government agencies, banks and other businesses across the globe and crippled parts of the British health care system. – AP

Article type: metered
User Type: anonymous web
User Status:
Campaign ID: 18
Cxense type: free
User access status: 3
   

Did you find this article insightful?

Yes
No

Next In Tech News

Beijing dismisses alleged Chinese hacking of Indian vaccine makers
Amazon issues rare apology in India after complaints that series hurt Hindu beliefs
Facebook Oversight Board changes timeline rules for action on case appeals
Reliance Jio splashes out $8 billion in Indian airwaves auction
Google teams up with Allianz, Munich Re to insure its cloud users
Adevinta, eBay to sell UK units to secure $9.2 billion tie-up
'Pawri' power: 5-second social media clip pulls India, Pakistan closer
US asks Google for detailed search data in antitrust case
WhatsApp announces new feature for users to mute audio in videos before sharing
Kremlin says Elon Musk's Clubhouse invitation to Putin came to nothing

Stories You'll Enjoy


Vouchers