Suspected South Korean hackers target North Korea experts with novel malware
DarkHotel group with possible ties to Seoul’s spy agency lures journalist and nonprofit worker using malicious emails
Hackers suspected to be based in South Korea have targeted North Korea experts with several variants of a new malware family that aims to take full control of their computers, an NK Pro investigation with cybersecurity firm Kaspersky Lab found.
In its most recent iteration, the malware hid malicious code in two BMP image files before extracting it on the target device, Kaspersky lead security researcher Seongsu Park told NK Pro. He said the code was likely created by DarkHotel, a highly sophisticated group that has targeted victims in East Asia since at least 2007, getting its name
- 01State media review: North Korea says ‘no reason’ it can’t meet with Japan
- 02North Korea primed for quick rebound after satellite launch failure: Analysis
- 03What to make of conflicting signs about a North Korean border reopening
- 04North Korea hacked an election body. But political interference wasn’t the goal.
- 05Secrecy surrounding North Korea’s upcoming plenum points to big changes afoot
- 06State media review: North Korea provides a front-row seat to anti-Yoon protests
- 07By linking radars, ROK and Japan reduce blind spots around North Korean missiles
- 08Poker face: North Korea tries new strategy in crackdown on ‘bluffing’ and lying