U.S. markets close in 10 minutes
  • S&P 500

    3,925.52
    +44.15 (+1.14%)
     
  • Dow 30

    31,977.29
    +439.94 (+1.39%)
     
  • Nasdaq

    13,581.73
    +116.53 (+0.87%)
     
  • Russell 2000

    2,282.98
    +51.66 (+2.32%)
     
  • Crude Oil

    63.23
    +1.56 (+2.53%)
     
  • Gold

    1,800.00
    -5.90 (-0.33%)
     
  • Silver

    27.91
    +0.22 (+0.80%)
     
  • EUR/USD

    1.2170
    +0.0015 (+0.12%)
     
  • 10-Yr Bond

    1.3890
    +0.0270 (+1.98%)
     
  • GBP/USD

    1.4137
    +0.0023 (+0.16%)
     
  • USD/JPY

    105.8500
    +0.6130 (+0.58%)
     
  • BTC-USD

    48,762.63
    +3,005.41 (+6.57%)
     
  • CMC Crypto 200

    976.52
    -38.40 (-3.78%)
     
  • FTSE 100

    6,658.97
    +33.03 (+0.50%)
     
  • Nikkei 225

    29,671.70
    -484.33 (-1.61%)
     

Google reveals North Korean-backed campaign targeting security researchers

Mariella Moon
·Associate Editor
·2 min read

Google’s Threat Analysis Group has identified an ongoing campaign that’s been targeting security researchers working on vulnerabilities over the past few months. The team says “a government-backed entity based in North Korea” is behind the attacks, which typically use social engineering to engage the victims. In a post detailing the campaign, TAG’s Adam Weidemann explained that the bad actors would go to great lengths to gain the victims’ trust, mostly by posing as researchers themselves.

They’d build their own research blogs and fill them with analysis of vulnerabilities that had been publicly disclosed to make themselves look legitimate. The bad actors also maintained Twitter accounts to post videos of their claimed exploits and to reach as many people as possible. In at least one instance, Google found one of the Twitter accounts defending a video the bad actors posted on YouTube containing an exploit that turned out to be fake.

Google’s TAG team said the attackers contacted their intended victims, asking to collaborate on vulnerability research. Aside from Twitter, they also used LinkedIn, Telegram, Discord, Keybase and email to reach out to their targets, sending them a Microsoft Visual Studio Project with malware to gain entry to their systems. In some cases, victims’ computers were compromised after visiting a bad actor’s blog after following a link on Twitter. Both methods led to the installation of a backdoor on the victims’ computers that connected them to an attacker-controlled command and control server.

The victims’ systems were compromised while running fully patched and up-to-date Windows 10 and Chrome browsers. Google’s TAG Team has only seen the attackers targeting Windows systems, thus far, but it still can’t confirm “the mechanism of compromise” and is encouraging researchers to submit Chrome vulnerabilities to its bug bounty program. The team has also listed all the actor-controlled websites and accounts it has identified as part of the campaign.