Inexsmar â€“ New DarkHotel Campaign Reveals Political Motivations
Bitdefender researcher have recently analyzed a malware sample that has been found to be very similar to something that a cybercriminal group, named DarkHotel, used to operate for nearly a decade.
The DarkHotel threat actors have been known to operate by targeting thousands of businesses across the world using the Wi-Fi infrastructure in hotels. Blending high-level spear phishing techniques with advanced malware and other complex attack avenues, the group has been able to operate for years without drawing any attention from law enforcement, apart for the few times some of their malware samples were documented by security researchers.
Unlike their usual way of compromising victims, the recently analyzed sample uses a new payload delivery mechanism rather than the traditional zero-day exploitation technique. Basically, instead of compromising a hotel’s Wi-Fi network to get to their victims, the new campaign blends social engineering with a relatively complex Trojan to infect a really select pool of victims.
Even more interesting is that if past DarkHotel campaigns used to target corporate research and development personnel, CEOs and other senior corporate officials, the new attack seems focused on politics rather than financial gains, at least judging from the content of the spear phishing email.
The social engineering part of the attack involves a very carefully crafted phishing email targeted to one person at a time, promising an attachment that contains sensitive political information about North Korea. In fact, it even shows a list of alleged contacts in the North Korean capital referencing organizations such as UN, UNICEF, and the World Food Programme.
Ironically, the decoy document even contained a warning message about spammer and ensuring privacy, encouraging recipients to use the Bcc address field to lessen the chances of spammers getting it. In addition to improving privacy, the document also said that it is also easier for readers to get to the actual email, rather than scrolling through the recipients first.
After opening the attachment, a multi-stage Trojan download would covertly install multiple malicious components designed to not only gain complete control over the targeted device, but also ensure persistency while dodging the victim’s security defenses.
The use of valid digital certificates, multi-stage payloads, carefully crafted political spear phishing messages, and cherry-picked victims could suggest the group is government-sponsored. However, is nearly impossible know that for sure when it comes to the cyber world, but it is clear that a sudden shift in the DarkHotel”s group behavior has occurred.
For more details about the APT, check out the full Inexmar technical research.
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US
July 16, 2021
How to protect yourself against cyberstalking
July 06, 2021
The Top Five Security Risks Smartphone Users Face Today
July 02, 2021
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials
July 02, 2021
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger
June 30, 2021
Mobile security threats: reality or myth?
June 13, 2021
FOLLOW US ON
You might also like
July 23, 2021
July 22, 2021
July 20, 2021