U.S. Organizations Involved with Nuclear Deterrence are the Target of North Korean Phishing Attacks

cyberwire-NKsUsing some very sophisticated methods, the Kimsuky group is believed to be behind a spear phishing campaign aimed at stealing U.S. secrets.

This attack, dubbed “Autumn Aperture” by cybersecurity compromise management firm Prevailion, is a great example of just how much diligence and effort a cybercriminal group will exert in order to ensure their success.

In this string of attacks, not only were U.S. firms targeted, but specific individuals and their work details were also gathered to establish context for spear phishing attacks aimed at compromising endpoints. For example, one target was sent a copy of his speaker’s notes for a presentation recently given. The notes were a legitimate document requiring macros to be enabled to be viewed in order to launch the malicious code lying within the document. In many cases, similar levels of contextual detail were used in order to make the phishing attacks very personal.

On the malware side, the malicious code was even designed to call Windows Management Instrumentation (WMI) on the endpoint inquiring about all running processes in order to identify security solutions that would detect a downloaded payload.

This level of detail put into both the phishing attacks and the malware demonstrate the level that attackers will go to should they really want to gain entrance to your network.

Organizations concerned about any kind of phising attack should be educating users with Security Awareness Training in an effort to elevate their understanding about the potential risk in opening attachments and clicking links. This training helps users become savvy about phishing scams, social engineering, etc. so that when (not if) they come in contact with a phishing email, it will be spotted immediately and discarded rather than clicked on.

The CyberWire has the PodCast: https://thecyberwire.com/podcasts/cw-podcasts-rs-2019-09-28.html

Free Phishing Security Test

Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

PST ResultsHere's how it works:

  • Immediately start your test for up to 100 users (no need to talk to anyone)
  • Select from 20+ languages and customize the phishing test template based on your environment
  • Choose the landing page your users see after they click
  • Show users which red flags they missed, or a 404 page
  • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
  • See how your organization compares to others in your industry

Go Phishing Now!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:


Subscribe To Our Blog

Ransomware Hostage Rescue Manual

Get the latest about social engineering

Subscribe to CyberheistNews