North Korean APT43 hackers target organizations to launder crypto using cloud

Cybersecurity researchers have shared details on a North Korean state-sponsored hacking group that’s been operating in the shadows for five...

Cybersecurity researchers have shared details on a North Korean state-sponsored hacking group that’s been operating in the shadows for five years now. 

Called APT43, the group was seen targeting governments, and high-profile individuals in the West (the US, Europe), but also in its neighborhood (Japan, South Korea).

The findings were shared by experts from Mandiant, which described APT43 as a “moderately sophisticated” group that mostly goes after sensitive information, but sometimes also is just after money, with stolen funds usually going to fund additional cybercrime operations.

Laundering cryptos

When stealing money, APT43 mostly targets cryptocurrencies. The researchers spotted the group using fake crypto investment apps for Android, tricking people interested in crypto loans, and stealing their funds, which are later laundered through hash rental and cloud mining services.

When stealing sensitive information, it mostly targets government and military agencies from North Korea’s adversaries:

"The group is primarily interested in information developed and stored within the U.S. military and government, defense industrial base (DIB), and research and security policies developed by U.S.-based academia and think tanks focused on nuclear security policy and nonproliferation," Mandiant says in its report.

"APT43 has displayed interest in similar industries within South Korea, specifically non-profit organizations and universities that focus on global and regional policies, as well as businesses, such as manufacturing, that can provide information around goods whose export to North Korea has been restricted."

Mandiant’s key argument that APT43 is a government player is the fact that it’s been seen “abruptly” switching targets, most likely after getting orders from higher echelons.

"More specifically, Mandiant assesses with moderate confidence that APT43 is attributable to the North Korean Reconnaissance General Bureau (RGB), the country's primary foreign intelligence service," the company said. The researchers have been tracking the group’s activities since 2018.

Via: BleepingComputer



from TechRadar - All the latest technology news https://ift.tt/WeFfaDz
via IFTTT

COMMENTS

BLOGGER
Name

Apps,3858,Business,151,Camera,1155,Earn $$$,3,Gadgets,1741,Games,926,GTA,1,Innovations,3,Mobile,1697,Paid Promotions,5,Promotions,5,Sports,1,Technology,8106,Trailers,796,Travel,37,Trending,4,Trendly News,25335,TrendlyNews,183,Video,5,XIAOMI,13,YouTube - 9to5Google,182,
ltr
item
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews: North Korean APT43 hackers target organizations to launder crypto using cloud
North Korean APT43 hackers target organizations to launder crypto using cloud
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews
http://www.trendlynews.in/2023/03/north-korean-apt43-hackers-target.html
http://www.trendlynews.in/
http://www.trendlynews.in/
http://www.trendlynews.in/2023/03/north-korean-apt43-hackers-target.html
true
3372890392287038985
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy