The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense have released a trio of malware reports with details of malware and campaigns linked to North Korea. The three bring the number of reports on North Korean malware to 11 in the first few months of 2020.
The new reports offer intelligence on three different pieces of malware launched by Hidden Cobra, the name given by CISA and the FBI to North Korea’s overall cyber-threat activities. The first, dubbed CopperHedge, is a variant of the Manuscrypt family of remote access trojans (RATs). According to CISA, The Manuscrypt family of malware is used by advanced persistent threat cyber actors to target cryptocurrency exchanges. Manuscrypt is a full-featured RAT capable of running arbitrary commands, performing system reconnaissance, and exfiltrating data. So far, six distinct variants of Manuscrypt have been identified.
Next, TaintedScribe is a beaconing and command package that is intended to infect a target machine, gain persistence, and then download multiple functional modules to use the now-infected computer for any number of malicious purposes. Both TaintedScribe and the next piece of malware use “FakeTLS” techniques to obfuscate their network identities and activities.
The third piece of malware, PebbleDash, is another beaconing and command package, this time presenting itself as a downloadable linked library (DLL) rather than as an application. As with TaintedScribe, once PebbleDash has infected the target machine and gained persistence, it connects with a command server and either downloads a module with additional functionality or awaits further instruction.
For more, read here.
Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio