EHA
Home Cloud NSA & FBI Warn: North Korean Hackers Targeting Military and Nuclear Programs

NSA & FBI Warn: North Korean Hackers Targeting Military and Nuclear Programs

0

The DPRK’s Reconnaissance General Bureau, 3rd Bureau, known as Andariel, Onyx Sleet, DarkSeoul, Silent Chollima, or Stonefly/Clasiopa, is actively targeting defense, aerospace, nuclear, and engineering sectors globally to steal sensitive data for their military and nuclear programs. 

The state-sponsored cyber group funds operations through ransomware attacks on U.S. healthcare entities, exploiting vulnerabilities like Log4j to deploy web shells, steal credentials, and deploy malware. 

By employing phishing, they leverage compromised systems and exfiltrate data. Critical infrastructure organizations must prioritize patching, web server protection, endpoint monitoring, and robust authentication to mitigate this persistent threat. 

North Korea’s RGB 3rd Bureau, also known as Andariel, is a state-sponsored cyber group targeting defense, aerospace, nuclear, and engineering sectors globally to exfiltrate sensitive information and intellectual property. 

Andariel Cyber-Espionage Victimology

The primary objective is to support the nation’s nuclear and defense programs by acquiring critical data such as contract specifications, design blueprints, and project details. Cyber-espionage activity poses a significant threat to national security and economic interests worldwide. 

Andariel actors leverage ransomware attacks on U.S. healthcare entities to fund cyber espionage operations targeting various sectors by conducting reconnaissance using publicly available tools to identify vulnerable systems and gather open-source intelligence on potential targets. 

The actors prioritize research on specific CVEs, including Apache, Citrix, Ivanti, MOVEit, and numerous others, to exploit weaknesses and gain unauthorized access to victim networks.

They possess a robust arsenal of custom-built Remote Access Trojans (RATs) and malware to facilitate comprehensive system compromise, including Atharvan, ELF Backdoor, Jupiter, and numerous others, which grant remote operators extensive capabilities such as command execution, keylogging, file manipulation, network traffic interception, and persistent backdoor installation. 

By utilizing these tools to establish and maintain covert access to victim systems, they often employ multiple RATs with distinct command-and-control channels for enhanced persistence and evasion. 

By leveraging readily available commodity malware, including open-source tools like Mimikatz, Impacket, and others, to compromise web servers through vulnerabilities like Log4Shell, enabling access to sensitive information and further exploitation, often targeting multiple organizations simultaneously. 

The widespread use of these commercial tools hinders attribution, necessitating sophisticated techniques like custom malware and infrastructure analysis to identify particular threat actors

Adversaries employ Living Off the Land (LOTL) tactics, utilizing native tools like command line interfaces and scripting languages for reconnaissance and lateral movement. They commonly leverage netstat for network discovery and exhibit a preference for packing malicious tools with VMProtect and Themida, obscuring code and evading detection. 

According to the National Cyber Security Centre, erroneous command syntax and typos suggest ad-hoc execution rather than rigid playbook adherence, indicative of a less sophisticated but adaptable threat actor. 

They employ a multi-phase attack lifecycle. Initially, they steal credentials using tools like Mimikatz and NTDS.dit manipulation, followed by extensive network and file system discovery. 

Lateral movement is achieved through RDP and keylogging. Command and control are established via obfuscated HTTP traffic and tunneling tools. Collected data, often related to the defense and military sectors, is exfiltrated to cloud storage or controlled servers using methods like FTP and custom archiving. 

Also Read:

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version