Cybersecurity researchers have shared details on a North Korean state-sponsored hacking group that’s been operating in the shadows for five years now.
Called APT43, the group was seen targeting governments, and high-profile individuals in the West (the US, Europe), but also in its neighborhood (Japan, South Korea).
The findings were shared by experts from Mandiant, which described APT43 as a “moderately sophisticated” group that mostly goes after sensitive information, but sometimes also is just after money, with stolen funds usually going to fund additional cybercrime operations.
When stealing money, APT43 mostly targets cryptocurrencies. The researchers spotted the group using fake crypto investment apps for Android, tricking people interested in crypto loans, and stealing their funds, which are later laundered through hash rental and cloud (opens in new tab) mining services.
When stealing sensitive information, it mostly targets government and military agencies from North Korea’s adversaries:
“The group is primarily interested in information developed and stored within the U.S. military and government, defense industrial base (DIB), and research and security policies developed by U.S.-based academia and think tanks focused on nuclear security policy and nonproliferation,” Mandiant says in its report (opens in new tab).
“APT43 has displayed interest in similar industries within South Korea, specifically non-profit organizations and universities that focus on global and regional policies, as well as businesses, such as manufacturing, that can provide information around goods whose export to North Korea has been restricted.”
Mandiant’s key argument that APT43 is a government player is the fact that it’s been seen “abruptly” switching targets, most likely after getting orders from higher echelons.
“More specifically, Mandiant assesses with moderate confidence that APT43 is attributable to the North Korean Reconnaissance General Bureau (RGB), the country’s primary foreign intelligence service,” the company said. The researchers have been tracking the group’s activities since 2018.
Via: BleepingComputer (opens in new tab)