Bose Work Remote Promo
Bose Work Remote Mobile Promo
Take Our Survey on Your IoT/Collaboration Plans & You Could Win a 60" 4K UHD Display!
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Downloads
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

Google: North Korean Actors Targeting Vulnerability Researchers

Google says the company has identified a hacking campaign that uses social engineering to target researchers that are working on vulnerabilities.

January 26, 2021 Zachary Comeau Leave a Comment

Google Vulnerability Researchers

Google says the company has identified an ongoing hacking campaign that targets security researchers that are working on vulnerability research and development at different companies and organizations, and the attackers are believed to be backed by North Korea.

In a blog, Google’s Threat Analysis Group (TAG) says the actors behind the hacking campaign have employed several tools and activities to target researchers, including social engineering attacks that target researchers via Twitter and phony security researcher blogs.

To build credibility with legitimate security researchers, the group established a research blog and multiple Twitter profiles to interact with the security researcher community. Blogs and posts include analysis of publicly disclosed vulnerabilities and guest posts from “unwitting legitimate security researchers.”

However, some of the exploits the group claimed to have found were fake, including a claimed exploit of a recently patched Windows Defender vulnerability. Multiple comments on the video – hosted on YouTube – indicated that the research was fake.

The TAG post included a detailed description of the novel social engineering the group undertook to trick security researchers into collaborating with them.

Read Next: Microsoft, Google, Other Big Tech Firms Join Legal Fight Against Hacking Company NSO Group

After establishing a line of communication with researchers, the group would ask to collaborate on vulnerability research together, and then provide researchers with a Visual Studio Project.

“Within the Visual Studio Project would be source code for exploiting the vulnerability, as well as an additional DLL that would be executed through Visual Studio Build Events,” according to the TAG. “The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.”

Read Next: Microsoft, Google, Other Big Tech Firms Join Legal Fight Against Hacking Company NSO Group

Other methods included compromising researchers after they visited the fake vulnerability research blog. After following a link on Twitter to a post on the blog, a malicious service was installed on the research’s system and an in-memory backdoor would begin beaconing to an actor-owned command and control server, according to the post.

“At the time of these visits, the victim systems were running fully patched and up-to-date Windows 10 and Chrome browser versions,” Google’s TAG posted. “At this time we’re unable to confirm the mechanism of compromise, but we welcome any information others might have.”

Other platforms used to communicate with targets include LinkedIn, Telegram, Discord, Keybase and email.

So far, researchers have only observed the actors targeting Windows systems as part of this activity.

“If you are concerned that you are being targeted, we recommend that you compartmentalize your research activities using separate physical or virtual machines for general web browsing, interacting with others in the research community, accepting files from third parties and your own security research,” Google’s security team posted.

For a list of the social media accounts, links and indications of compromise, read Google’s blog post.

Tagged With: Cybersecurity, Google, Vulnerability Research

Related Content:

  • hybrid work endpoints Study: Security, Scalability Top Concerns of Remote Work
  • Crestron 70 Series Scheduling Panels Microsoft Teams Microsoft Teams Panels Now Generally Available
  • delivery robots Delivery Robots are Coming To Campuses
  • IBM Siemens Red hat Hybrid Cloud IBM, Siemens, Red Hat Collaborate On Hybrid Cloud…

Free downloadable guide you may like:

  • Introducing the IT Pro MBA: Vetting Technology

    At some point in your career there is going to come a time when you are tasked with reviewing and vetting new tech to implement into your company. Sometimes the hardest part of the whole thing is just getting started. In this new series from My TechDecisions, the IT Pro MBA: Vetting Technology guide deep-dives […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Introducing the IT Pro MBA: Vetting Technology

At some point in your career there is going to come a time when you are tasked with reviewing and vetting new tech to implement into your company. ...

9 Technology Products to Help Combat COVID-19 Spread in the Workplace

As the Coronavirus continues on and leads us further into uncertainty, the question remains, “when do we return to the office?” For some the answer...

Top 9 Reasons Enterprise IT Leaders Are Moving Their Video Surveillance to the Eagle Eye Cloud

Working in IT has enough challenges without adding in the complications of surveillance video. Things like total cost of maintenance, how the VMA m...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2021 Emerald X, LLC. All rights reserved.