Security researchers targeted by North Korean affiliated hackers via Social Media
Just recently, Google’s Threat Analysis Group (TAG) said North Korean hackers used multiple profiles on various social networks, such as Twitter, LinkedIn, Telegram, Discord, and Keybase, to reach out to security researchers using fake personas.
In a blog post by Adam Weidemann from Google's Threat Analysis Group (TAG), he said: “In order to build credibility and connect with security researchers, the actors established a research blog and multiple Twitter profiles to interact with potential targets. They've used these Twitter profiles for posting links to their blog, posting videos of their claimed exploits and for amplifying and retweeting posts from other accounts that they control.”
Credits : Google TAG
On January 14, they tweeted a Youtube video which seems to be an exploit against Windows Defender (CVE-2021-1647) which got recently patched. In the video they spawned a CMD Shell but other security researchers commented that the exploit was fake and not working.
Credits : Google TAG
Once they established a credible personality online, They have started to contact their targets seeking collaboration on vulnerability research.
Upon agreement they will send a Visual Studio Project to the target which contains the source code for exploiting the vulnerability and an additional DLL that would be executed through Visual Studio Build Events. The DLL is a custom malware that will immediately begin to contact the command and control server.
Credits: Google TAG
Other victims are compromised after visiting a blog, TAG researchers discovered this when they followed a link to a blog that was hosted on blogbr0vvnnio (please don't visit) which they noticed a malicious service installed on their system and in-memory backdoor had begun beaconing to an actor-owned command and control server.
Google TAG noted that the researchers were running Google Chrome browser on a patched and fully updated copy of Windows 10. Details about the browser-based attacks are still unknown.
Google invites security researchers to report discovered vulnerabilities including those being exploited in the wild (ITW) to Chrome's Vulnerability Reward Program
