Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » North Korean hackers target energy and aerospace industries with new MISPPEN malware
Global Security

North Korean hackers target energy and aerospace industries with new MISPPEN malware

AdminBy AdminSeptember 18, 2024No Comments3 Mins Read
MISTPEN Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 18, 2024Ravi LakshmananCyber ​​espionage / malware

MISTPEN Malware

A cyber espionage group linked to North Korea has been seen using leverage phishing lures for jobs to target potential victims in the energy and aerospace verticals and infect them with a previously undocumented backdoor called MISPPEN.

The activity cluster is tracked by Mandiant, owned by Google, under a pseudonym UNC2970which he said coincides with a threat group known as TEMP. Hermitwhich is also commonly referred to as the Lazarus Group or Diamond Sleet (formerly Zinc).

The threat actor has a history of attacking government, defense, telecommunications and financial institutions around the world since at least 2013 to gather strategic intelligence supporting North Korea’s interests. It is associated with the General Directorate of Intelligence (RGB).

Cyber ​​security

The threat intelligence firm said it observed UNC2970 targeting various organizations located in the US, UK, Netherlands, Cyprus, Sweden, Germany, Singapore, Hong Kong and Australia.

“UNC2970 targets victims under the guise of job vacancies, posing as a recruiter for well-known companies.” said in a new analysis, adding it copies and modifies job descriptions according to their target profiles.

“Furthermore, the selected job descriptions target senior/management employees. This indicates that the threat actor is seeking to gain access to confidential and sensitive information that is normally restricted to senior-level employees.”

The attack chains, also known as Operation Dream Job, involve using phishing lures to interact with victims via email and WhatsApp in an attempt to build trust before sending a malicious ZIP archive dressed as a job description.

Interestingly, the description PDF file can only be opened with a trojanized version of a legitimate PDF reader application called Sumatra PDF included in the MISTPEN delivery archive using a launcher called BURNBOOK.

MISTPEN Malware

It should be noted that this does not involve attacks on the supply chain and does not have vulnerabilities in the software. Rather, it was found that the attack used an old version of Sumatra PDF that had been repurposed to activate the infection chain.

This is a tried and tested method adopted by a group of hackers back in 2022, both from Mandiant and Microsoft highlighting the use of a wide range of open source software for these attacks, including PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording software.

It is believed that the threat actors are likely to instruct victims to open the PDF file with the included weaponized PDF viewer in order to launch the execution of the malicious DLL file, a C/C++ launcher called BURNBOOK.

“This file is a dropper for the embedded DLL ‘wtsapi32.dll’, which is tracked as TEARPAGE and is used to execute the MISTPEN backdoor after a system reboot,” Mandiant researchers said. “MISTPEN is a trojan version of the legitimate Notepad++ plugin, binhex.dll, which contains a backdoor.”

Cyber ​​security

TEARPAGE, the bootloader built into BURNBOOK, is responsible for decrypting and running MISPPEN. A lightweight implant written in C, MISPEN is equipped to load and execute Portable Executable (PE) files received from the Command and Control Server (C2). It communicates via HTTP with the following Microsoft Graph URLs.

Mandiant also claimed to have discovered older BURNBOOK and MISPPEN artifacts, suggesting they are periodically upgraded to add more capabilities and allow them to fly under the radar. The first samples of MISTPEN also used compromised WordPress sites as C2 domains.

“The threat actor has refined its malware over time, introducing new features and adding network connectivity checks to thwart sample analysis,” the researchers said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.