North Korean hackers exploit VPN update flaw to install malware

Share:

South Korea’s National Cyber Security Center (NCSC) warns that state-backed DPRK hackers hijacked flaws in a VPN’s software update to deploy malware and breach networks.

The advisory connects this activity with a nationwide industrial factories modernization project Kim Jong-un, the North Korean president, announced in January 2023, believing the hackers are looking to steal trade secrets from South Korea.

The two threat groups implicated in this activity are Kimsuky (APT43) and Andariel (APT45), state-sponsored actors previously linked to the notorious Lazarus Group.

“The Information Community attributes these hacking activities to the Kimsuky and Andariel hacking organizations under the North Korean Reconnaissance General Bureau, noting the unprecedented nature of both organizations targeting the same sector simultaneously for specific policy objectives,” warns the NCSC.

Trojanized updates and installers

In the first case highlighted in the advisory, dated January 2024, Kimsuky compromised the website of a South Korean construction trade organization to disseminate malware to visitors.

According to a February report by ASEC, when employees attempted to log into the organization’s website, they were prompted to install required security software called “NX_PRNMAN” or “TrustPKI.”

These trojanized installers were digitally signed with a valid certificate from Korean defense company “D2Innovation,” effectively bypassing antivirus checks.

When the trojanized software was installed, the malware was also deployed to capture screenshots, steal data stored in browsers (credentials, cookies, bookmarks, history), and steal GPKI certificates, SSH keys, Sticky Notes, and FileZilla data.

This campaign infected the systems of South Korean construction companies, public institutions, and local governments.

The second case occurred in April 2024, when the NCSC says the Andariel threat actors exploited a vulnerability in a domestic VPN software’s communication protocol to push out fake software updates that install the DoraRAT malware.

“In April 2024, the Andariel hacking group exploited vulnerabilities in domestic security software (VPN and server security) to replace update files with malware, distributing remote control malware named “DoraRAT” to construction and machinery companies,” explains a machine-translated version of the NCSC advisory.

The NCSC says the vulnerability allowed the threat actors to spoof packets to users’ PCs, which misidentified them as legitimate server updates, allowing the malicious versions to be installed.

DoraRAT is a lightweight remote access trojan (RAT) with minimal functionality that allows it to operate more stealthily.

The variant observed in the particular attack was configured for stealing large files, such as machinery and equipment design documents, and exfiltrating them to the attacker’s command and control server.

The NCSC says operators of websites at risk of being targeted by state-sponsored hackers should request security inspections from Korea’s Internet & Security Agency (KISA).

Additionally, it is recommended that strict software distribution approval policies be implemented and administrator authentication be required for the final distribution stage.

Other generic advice includes timely software and OS updates, ongoing employee security training, and monitoring government cybersecurity advisories to identify and stop emerging threats quickly.

In similar activity, a Chinese hacking group breached an ISP to poison DNS entries so automatic software updates for legitimate software installed malware instead.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
2:00 am, Jan 22, 2025
weather icon 3°C
L: 2° | H: 3°
mist
Humidity: 90 %
Pressure: 1007 mb
Wind: 1 mph SE
Wind Gust: 2 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 4 km
Sunrise: 7:52 am
Sunset: 4:31 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
2° | 3°°C 1 mm 100% 5 mph 95 % 1006 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
2° | 8°°C 1 mm 100% 17 mph 94 % 1005 mb 0 mm/h
Fri Jan 24 9:00 pm
weather icon
6° | 10°°C 1 mm 100% 24 mph 91 % 1004 mb 0 mm/h
Sat Jan 25 9:00 pm
weather icon
4° | 6°°C 0.89 mm 89% 8 mph 86 % 1012 mb 0 mm/h
Sun Jan 26 9:00 pm
weather icon
5° | 8°°C 0.2 mm 20% 14 mph 86 % 1011 mb 0 mm/h
Today 3:00 am
weather icon
3° | 3°°C 0 mm 0% 3 mph 90 % 1006 mb 0 mm/h
Today 6:00 am
weather icon
3° | 3°°C 0.8 mm 80% 3 mph 92 % 1006 mb 0 mm/h
Today 9:00 am
weather icon
3° | 4°°C 1 mm 100% 3 mph 94 % 1005 mb 0 mm/h
Today 12:00 pm
weather icon
4° | 4°°C 0.8 mm 80% 4 mph 91 % 1003 mb 0 mm/h
Today 3:00 pm
weather icon
4° | 4°°C 0 mm 0% 5 mph 89 % 1002 mb 0 mm/h
Today 6:00 pm
weather icon
3° | 3°°C 0 mm 0% 3 mph 87 % 1003 mb 0 mm/h
Today 9:00 pm
weather icon
2° | 2°°C 0 mm 0% 4 mph 95 % 1004 mb 0 mm/h
Tomorrow 12:00 am
weather icon
2° | 2°°C 0 mm 0% 3 mph 94 % 1004 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€101,415.65
4.40%
Ethereum(ETH)
€3,192.40
2.59%
XRP(XRP)
€3.06
2.81%
Tether(USDT)
€0.96
0.13%
Solana(SOL)
€241.91
6.62%
Dogecoin(DOGE)
€0.353595
6.42%
USDC(USDC)
€0.96
0.00%
Shiba Inu(SHIB)
€0.000020
2.88%
Pepe(PEPE)
€0.000015
2.70%
Peanut the Squirrel(PNUT)
€0.354125
-1.82%
Scroll to Top