Cybersecurity News that Matters

Cybersecurity News that Matters

Cyber firm discovered new backdoor used by North Korean linked hackers

by Kuksung Nam

Dec. 02, 2022
1:24 PM GMT+9

By Kuksung Nam, The Readable
Dec. 2, 2022 10:23PM KST

A hacking group, who authorities say worked on the behalf of the North Korean government, used an unreported backdoor to attack a South Korean news organization focused on North Korea in 2021, a private cybersecurity firm reported.

According to a report released Wednesday by ESET, this backdoor is able to be used to spy on victims’ computers by monitoring drives, exfiltrating files, keylogging, taking screenshots, and stealing credentials from browsers. Keylogging is a type of monitoring software that can record and steal keystrokes that the user enters on a device.

In addition, this new backdoor, which the company named Dolphin, abuses cloud storage services, specifically Google Drive, for command and control communication.

ESET discovered this backdoor while analyzing the attack on a South Korean news organization, which specializes in issues related to North Korea, by an alleged North Korean hacking group APT37 last year. This group is also known as ScarCruft or Reaper. The report described APT37 as a hacking group that primarily focuses on South Korea.

This is the second backdoor discovered by cybersecurity firms that is related to the attack. According to a report released by the cybersecurity firm Volexity in August of last year, the attacker deployed different exploits including an Internet Explorer exploit and a backdoor which they named BLUELIGHT.

“We discovered (…) a more sophisticated backdoor deployed on selected victims via BLUELIGHT,” wrote ESET researcher Filip Jurčacko, who analyzed the backdoor, in a blogpost on WeLiveSecurity.

The researcher said that the second backdoor “actively searches drives and automatically exfiltrates files with extensions of interest to ScarCruft” compared with the first backdoor.

Cybersecurity firms have been observing multiple versions of this backdoor since its initial discovery in April 2021. The researchers have found that the attackers continue to develop the backdoor’s capabilities and made attempts to evade detection.

“A notable feature of earlier Dolphin versions (…) is the ability to modify the settings of victims’ signed-in Google and Gmail accounts to lower their security,” explained Filip Jurčacko. “[This is] most likely to maintain access to victims’ email inboxes.”

[email protected]


Kuksung Nam is a cybersecurity journalist for The Readable. She covers cybersecurity issues in South Korea, including the public and private sectors. Prior to joining The Readable, she worked as a political reporter for one of the top-five local newspapers in South Korea, The Kyeongin Ilbo, where she reported several exclusive stories regarding the misconduct of local government officials. She is currently focused on issues related to anti-fraud, as well as threats and crimes in cyberspace. She is a Korean native who is fluent in English and French, and she is interested in delivering the news to a global audience.

Subscription

Subscribe to our newsletter for the latest insights and trends. Tailor your subscription to fit your interests:

By subscribing, you agree to our Privacy Policy. We respect your privacy and are committed to protecting your personal data. Your email address will only be used to send you the information you have requested, and you can unsubscribe at any time through the link provided in our emails.

  • Kuksung Nam
    : Author

    Kuksung Nam is a journalist for The Readable. She has extensively traversed the globe to cover the latest stories on the cyber threat landscape and has been producing in-depth stories on security and...

    View all posts
Author:
Stay Ahead with The Readable's Cybersecurity Insights