North Korean hackers are allegedly abusing users’ interest in cryptocurrency to spread malicious codes, according to cybersecurity researchers on Monday.
In a report, South Korean cybersecurity firm AhnLab stated that they discovered three malicious files disguised as benign Word documents on July 28. According to the researchers, the attackers posed as a cryptocurrency exchange and lured the targets into clicking on the compromised documents by giving the files names related to intriguing topics, such as common traits shared between cryptocurrency wallet hackings. AhnLab did not disclose the name of the cryptocurrency exchange.
The experts attributed the hacking attempt to one of the most prolific groups targeting the country, Kimsuky. “The hacking group is well known for applying specific strings of characters in the malicious code to confirm their targets when they are deploying an attack. One of the words they use is ‘Chnome,’ which is a typo of Chrome,” said the AhnLab Security Emergency response Center (ASEC) analysis team in an email statement to The Readable. “Based on this trait, we assume that this malicious code was written by Kimsuky.”
Kimsuky is widely believed to be working for the North Korean government.
The cybersecurity firm also spotted a malicious file disguised as a normal PDF document containing asset management information on July 17. They attributed this attack to the North Korean hacking group. The experts warned users about these attacks as it could lead to multiple malicious activities, such as downloading additional malware or extorting users’ personal information.
According to AhnLab, cybercriminals have been actively using cryptocurrency as a means to deploy malicious code to their targets. In May of last year, the researchers discovered a compressed file including a malicious document titled “recover lost cryptocurrency.” “It is easier for digital asset owners to be tricked into these attacking methods,” said the ASEC analysis team to The Readable. “It is important not to activate a URL or attached filed from an uncertain source and double check who the sender is when receiving an email.”
Notification on article updates: The South Korean cybersecurity firm AhnLab analyzes the hacking methods of Kimsuky. However, the company does not investigate which country is behind the group’s activities.