Australia markets closed
  • ALL ORDS

    6,925.70
    -74.90 (-1.07%)
     
  • ASX 200

    6,693.80
    -66.90 (-0.99%)
     
  • AUD/USD

    0.7706
    -0.0013 (-0.17%)
     
  • OIL

    64.34
    +0.51 (+0.80%)
     
  • GOLD

    1,689.40
    -11.30 (-0.66%)
     
  • BTC-AUD

    61,072.92
    -3,823.96 (-5.89%)
     
  • CMC Crypto 200

    940.29
    -46.92 (-4.75%)
     
  • AUD/EUR

    0.6441
    -0.0002 (-0.02%)
     
  • AUD/NZD

    1.0752
    +0.0016 (+0.15%)
     
  • NZX 50

    12,180.25
    -44.25 (-0.36%)
     
  • NASDAQ

    12,464.00
    -219.33 (-1.73%)
     
  • FTSE

    6,650.88
    -24.59 (-0.37%)
     
  • Dow Jones

    30,924.14
    -345.95 (-1.11%)
     
  • DAX

    14,056.34
    -23.69 (-0.17%)
     
  • Hang Seng

    29,067.54
    -169.25 (-0.58%)
     
  • NIKKEI 225

    28,678.26
    -251.85 (-0.87%)
     

Google reveals North Korean-backed campaign targeting security researchers

Mariella Moon
·Associate Editor
·2-min read

Google’s Threat Analysis Group has identified an ongoing campaign that’s been targeting security researchers working on vulnerabilities over the past few months. The team says “a government-backed entity based in North Korea” is behind the attacks, which typically use social engineering to engage the victims. In a post detailing the campaign, TAG’s Adam Weidemann explained that the bad actors would go to great lengths to gain the victims’ trust, mostly by posing as researchers themselves.

They’d build their own research blogs and fill them with analysis of vulnerabilities that had been publicly disclosed to make themselves look legitimate. The bad actors also maintained Twitter accounts to post videos of their claimed exploits and to reach as many people as possible. In at least one instance, Google found one of the Twitter accounts defending a video the bad actors posted on YouTube containing an exploit that turned out to be fake.

Google’s TAG team said the attackers contacted their intended victims, asking to collaborate on vulnerability research. Aside from Twitter, they also used LinkedIn, Telegram, Discord, Keybase and email to reach out to their targets, sending them a Microsoft Visual Studio Project with malware to gain entry to their systems. In some cases, victims’ computers were compromised after visiting a bad actor’s blog after following a link on Twitter. Both methods led to the installation of a backdoor on the victims’ computers that connected them to an attacker-controlled command and control server.

The victims’ systems were compromised while running fully patched and up-to-date Windows 10 and Chrome browsers. Google’s TAG Team has only seen the attackers targeting Windows systems, thus far, but it still can’t confirm “the mechanism of compromise” and is encouraging researchers to submit Chrome vulnerabilities to its bug bounty program. The team has also listed all the actor-controlled websites and accounts it has identified as part of the campaign.