Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » North Korean Apt43 uses PowerShell and Dropbox in South Korea’s targeted cyberattack
Global Security

North Korean Apt43 uses PowerShell and Dropbox in South Korea’s targeted cyberattack

AdminBy AdminFebruary 13, 2025No Comments3 Mins Read
South Korea Cyberattacks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 13, 2025Red LakshmananThe United States

South Korea's cyberattacks

The North Korea -related actor was associated with a permanent campaign aimed at the South Korean business, government and cryptocurrencies.

The Atacine Company is named Deep#drive Securonix was attributed to a hacking group known as Kimaswhich is also tracked under the names of APT43, Black Banshee, cheeky sleet, shiny fish, springtail, ta427 and velvet Chollima.

Cybersecurity

“Use, taking into account the phishing possessive possessive and disguised legal documents, the attackers successfully penetrated the target environment,” – Safety Researchers Den Iuzvyk and Tim Peck – Note In a report that is shared with Hacker News, describing the activity as a “complex and multi -stage operation.”

The bait documents sent through the phishing emails like .hwp, .xlsx and .PPTX, disguised in the work logs, insurance documents and files related to the crystand to fool the recipients to open them, thus causing the infection process.

The attacked network is characteristic of its great dependence on PowerShell scenarios at different stages, including delivery of useful load, exploration and execution. It is also characterized by Dropbox for distribution of useful load and expressive data.

South Korea's cyberattacks

It all starts with the ZIP archive, which contains one Windows Fast Access File (.lnk), which is masked as a legitimate document that, when extracting and launching, run the PowerShell code for obtaining and displaying the document located on Dropbox. A task called “Chromeupdatetaskmachine”.

One of these bait documents, written in Korean, concerns the security plan for loading operations at the logistics facility, delving into safe processing of heavy cargo and set ways to ensure the implementation of the safety standards.

The PowerShell scenario is also designed to contact the same Dropbox location to get another PowerShell scenario, which is responsible for collecting and extinguishing the system. In addition, it reduces the third PowerShell scenario, which ultimately is responsible for performing an unknown assembly .net.

“The use of Oauth authentication for Dropbox API interaction has allowed unobstructed exploration data, such as system information and active processes in advance,” the researchers said.

Cybersecurity

“This cloud infrastructure demonstrates an effective but hidden method of hosting and receiving useful loads, bypassing traditional IP or domain blocks. In addition, the infrastructure turned out to be dynamic and short, as evidenced by rapid removal of key links after initial stages in the initial stages, when Stages in the initial stages of the original stages that were an attack, a tactic that not only complicates the analysis, but also suggests that the attackers actively monitor their operational security companies. “

Securonix said he was able to use the Oauth tokens to get additional information about the actor’s threat infrastructure, revealing evidence that the company could take place from September last year.

“Despite the lack of the final stage, the analysis emphasizes complex methods, including clinging, hidden execution and dynamic file processing that demonstrate the attacker’s intention to avoid detecting and complicating the reaction to the incident,” the researchers concluded.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.