In this undated handout photo released by Ukrainian Foreign Ministry Press Service, the building of Ukrainian Foreign Ministry is seen during snowfall in Kyiv, Ukraine. Ukrainian officials and media reports say a number of government websites in Ukrain…
北朝鮮のハッカー集団は、2021年だけで総額450億円相当もの仮想通貨を盗んでいた
北朝鮮のハッカーが2021年にハッキングによって盗んだ仮想通貨が、総額3.95億ドル(約451億円)相当にもなることが明らかになった。これらのハッカーはすべて北朝鮮政府のために働いているとみられ、仮想通貨の窃盗が最重要事項になっていると指摘されている。
…
North Korean hackers said to have stolen nearly $400 million in cryptocurrency last year
North Korean hackers stole nearly $400 million worth of cryptocurrency in 2021, making it one of the most profitable years yet for cybercriminals in the severely isolated country, according to a new report.
Hackers launched at least seven different attacks last year, mostly targeting corporate investments and centralized exchanges with a variety of tactics including phishing, malware and social engineering, according to a report by Chainalysis, a company that tracks cryptocurrencies.
Cybercriminals attempted to gain access to organizations’ “hot” wallets: Internet-connected digital wallets, and then transfer funds to accounts controlled by the DPRK. The thefts are the latest indication that the heavily sanctioned country continues to rely on a network of hackers to help fund its domestic programs.
A confidential UN report previously accused North Korean regime leader Kim Jong Un of carrying out “operations against formerly moving financial institutions and virtual currency” to pay for weapons and keep the country afloat North Korean economy.
Last February, the US Department of Justice charged three North Koreans with conspiring to steal more than $1.3 billion from banks and businesses around the world and orchestrating crypto thefts. digital currency.
“North Korea is, in most respects, cut off from the global financial system by a long sanctions campaign by the United States and its foreign partners.” said Nick Carlsen, an analyst at blockchain intelligence firm TRM Labs. “As a result, they have taken to the digital battlefield to steal cryptocurrencies, essentially [a] high-speed internet bank robbery, to fund weapons programs, nuclear proliferation and other activities.
>
North Korea’s hacking efforts have benefited from this.The rise in value of Rising prices and the use of cryptocurrencies have generally made digital assets increasingly attractive to malicious actors, which led to more successful cryptocurrency thefts in 2021.
According to Chainalysis, most of the thefts in the past year were committed by the Lazarus Group, a hacker group with ties to North Korea that was previously linked to the Sony Pictures hack, among other incidents. ie North Koreans, in addition to sanctiones cybersecurity defensive measures such as crimes such as criminql have no real chance of being extradited.
As the cryptocurrency market becomes more popular, “we are likely to see continued interest from North Korea in targeting cryptocurrency companies that are young and that are building cyber defenses and anti-virus controls. -money laundering,” Carlsen said.
Teen hacker finds bug that lets him control 25+ Teslas remotely
The downside with offering APIs to interact with a car is that someone else’s security problem might become your own.Getty ImagesA young hacker and computer security researcher has found a way to remotely interact with more than 25 Tesla electric…
Microsoft Discovered New ‘Powerdir’ macOS Vulnerability, Fixed in 12.1 Update
This morning, Microsoft’s 365 Defender research team released details of a new macOS “Powerdir” vulnerability that allows an attacker to bypass transparency, consent, and control technology to gain unauthorized access to protected data. Appl…
Hackers Target Real estate websites with skimmer in latest supply chain attack
Threat actors used a cloud-based video hosting service to perform a supply chain attack on more than 100 real estate websites operated by Sotheby’s Realty that involved the injection of malicious skimmers to steal sensitive personal information . …
Beware of fake Telegram Messenger App Hacking PCs with Purple Fox Malware
The Telegram messaging app Trojan installers are used to deploy the Windows-based Purple Fox backdoor to compromised systems. That’s according to new research published by Minerva Labs, which describes the attack as different from intruders that …
New Flagpro malware linked to Chinese state-backed hackers
The cyber espionage group APT (Advanced Persistent Threat) Blackwell has been targeting Japanese companies with a new type of malware that researchers call “Flag pro”. Second level malware and run it.
Breaching corporate networks
The chain of infection begins with a phishing e-mail that was developed for the target organization and pretends to be a message from a trusted partner.
The e-mail contains a password-protected ZIP or RAR attachment with a Microsoft Excel file [.XLSM] linked to a malicious macro. Running this code creates an executable file in the Flag pro home directory.
When it first runs, Flagpro connects to the C2 server over HTTP and sends the system identification details obtained by executing hard-coded operating system commands.
In response, the C2 can send additional commands or a second-level payload that Flag pro can execute.
An example of a sent command Source: NTT Security
Communication between the two is base64 encoded, and there is also a configurable delay between connections to avoid creating an identifiable operating model.
Communication between Flagpro and the C2 Source: NTT Security
Flagpro has been used against Japanese companies for more than a year, at the latest since October 2020, according to a report by NTT Security.
The most recent samples the researchers were able to obtain are from July 2021. The target companies are from a variety of industries, including defense, media and communications technology.
Flagpro v2.0
At some point in their analysis, NTT researchers noticed a new version of Flag pro that can automatically close relevant dialog boxes to make external connections that could reveal their presence to the victim.
“In the Flag pro v1.0 implementation, if a dialog box titled ‘Windows セ キ ュ リ テ ィ’ appears when Flagpro is accessing an external site, Flagpro will automatically click the OK button to close the dialog box” explains NTT Security report. “This handling also works if the dialog is written in Chinese or English indicates destinations are in Japan, Taiwan, and English-speaking countries.
Inserted code serving as obfuscation in Flagpro v2.0 Source: NTT Security
Blackwell APT is a lesser known player discovered by Trendier researchers in the summer of 2017 and has partnered with China. His typical targets are in Taiwan, although he has occasionally targeted companies in Japan and Hong Kong to steal technology.
In February 2021, a report from Unit 42 linked Blackwell to Waterbear Flag pro, another cyber espionage group believed to have the backing of the Chinese government like Apt, Black tech, Knowledge and Refinement to adapt their tools to new reports like this one, Flag pro is likely to be modified for more stealth use.
As the NTT report concludes, “Recently they (Blackwell) started using another new malware called Selfsame Loader and Spider RAT. “That means they are actively developing new malware. Defenders should be aware of the new indicators of exposure to new malware and follow all security best practices to maintain a strong defense against sophisticated threats like Blackwell.
Source: Bleeping Computer
国家間のサイバー攻撃の応酬が「生活インフラ」に波及し、一般市民を巻き込み始めた
数十年にわたって対立しているイランとイスラエルの間で、サイバー攻撃の応酬が激化している。そのハッキングの対象は燃料供給システムや鉄道管制システム、航空会社などにまで及び、一般市民の生活が脅かされる事態にまで発展している。
…
静かなるハッキング手法「水飲み場型攻撃」が、あなたを狙っている
正規のウェブサイトを侵害することでサイトの訪問者のデヴァイスをハッキングする「水飲み場型攻撃」という手法が広まっている。水源を汚染して水を飲んだ人を感染させる手口に由来するこのハッキング手法は、静かに実行されることから成功率が高く、その危険性も高まっている。
…