New North Korean cyber-espionage campaign targets medical and energy sectors
Report says Lazarus Group showed its hand by mistakenly connecting to victim’s server from DPRK IP address
North Korea’s most notorious hacking syndicate orchestrated a spate of cyberattacks against the medical and energy sectors last year, according to a new report from a Finnish security firm.
According to WithSecure, the campaign — which they dub “No Pineapple!” — ran from May to Nov. 2022 and heavily utilized off-the-shelf malware and programs included with most operating systems by default.
“WithSecure Threat Intelligence assess with strong confidence that the threat actor is the Lazarus Group from the Third Bureau of North Korean People’s Army and that the goal of the campaign is intelligence gathering, specifically
- 01How sanctions contribute to North Korea’s humanitarian distress
- 02State media review: North Korea calls denuclearization a ‘declaration of war’
- 03Why North Korea and the Philippines view each other with mutual distrust
- 04North Korea’s new silo-based missile raises risk of prompt preemptive strikes
- 05Why normalizing US-North Korea relations is a prerequisite for denuclearization
- 06North Korean planes active at Pyongyang airport hours after runway missile test
- 07North Korea using US-ROK drills as cover to carry out missile tests, experts say
- 08State media review: North Korea says rusty American bombs threaten capital