ADVERTISEMENT
Wednesday, February 11, 2026
No Result
View All Result
The AZB More Than Just News
  • HOME
  • Latest News
  • Business
  • PAKISTAN
  • SPORTS
  • WORLD
  • E-Paper
  • SCI-TECH
  • BANKING
  • ARTICLES
  • OPINION
  • MORE
    • MOBILE
    • TELECOM
    • PERSONALITY
    • HEALTH / EDUCATION
  • HOME
  • Latest News
  • Business
  • PAKISTAN
  • SPORTS
  • WORLD
  • E-Paper
  • SCI-TECH
  • BANKING
  • ARTICLES
  • OPINION
  • MORE
    • MOBILE
    • TELECOM
    • PERSONALITY
    • HEALTH / EDUCATION
No Result
View All Result
Daily The Azb
No Result
View All Result
Home Headline

North Korea Using Social Engineering to Enable Hackingof Think Tanks, Academia, and Media SUMMARY.

News Desk by News Desk
June 8, 2023
North Korea Using Social Engineering to Enable Hackingof Think Tanks, Academia, and Media SUMMARY.
Share on FacebookShare on Twitter

The Federal Bureau of Investigation (FBI), the U.S. Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by the Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation (CNE) globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations. These North Korean cyber actors are known to conduct spear phishing campaigns posing as real journalists, academics, or other individuals with credible links to North Korean policy circles. The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to private documents, research, and communications of their targets.

BACKGROUND

Advertisements

North Korea’s cyber program provides the regime with broad intelligence collection and espionage capabilities. The Governments of the United States and the Republic of Korea (ROK a.k.a. South Korea) have observed sustained information-gathering efforts originating from these North Korean cyber actors.NorthKorea’sprimarymilitaryintelligenceorganization,theReconnaissanceGeneralBureau (RGB), which has been sanctioned by the United Nations Security Council, is primarilyresponsibleforthisnetworkofactors and for activities.

We assess the primary goals of the DPRK regime’s cyber program including maintaining consistent access to current intelligence about the United States, South Korea, and other countries of interest toimpedeanypolitical, military, or economic threattotheregime’ssecurityandstability.

Currently, the U.S. and ROK Governments, and private sector cyber security companies, track a specific set of DPRKcyberactorsconductingthese large-scalesocialengineeringcampaignsas

Disclaimer: This document is marked TLP:CLEAR. Disclosure is not limited. Sources may use TLP:CLEARwhen information carries minimal or no foreseeable risk of misuse, by applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be distributed without restriction.FormoreinformationontheTrafficLightProtocol, see HTTPS://www.cisa.gov/tlp.

Kimsuky, Thallium, APT43, Velvet Chollima, and Black Banshee. Kimsuky is administratively subordinate to an element within North Korea’s RGB and has conducted broad cyber campaigns in support of RGB objectives since at least 2012. Kimsuky actors’ primary mission is to provide stolendataandvaluable geopoliticalinsighttothe NorthKoreanregime.

Some targeted entities may discount the threat posed by these social engineering campaigns, either because they do not perceive their research and communications as sensitive, or because they are not aware of how these efforts fuel the regime’s broader cyberespionage efforts. However, as outlined in this advisory, North Korea relies heavily on intelligence gained by compromising policy analysts. Further, successful compromises enable Kimsuky actors to craft more credible and effective spearphishing emails that can be leveraged against more sensitive, higher-value targets. The authoring agencies believe that raising awareness of some of these campaigns and employing basic cyber security practices may frustrate the effectiveness of Kimsuky’s spearphishing operations. This advisory provides detailed information on how Kimsuky actors operate; red flags to consider as you encounter common themes and campaigns; and general mitigation measures for entities worldwide toimplementtobetterprotectagainstKimsuky’s CNE operations.

Ifyoubelieveyouhavebeentargetedinoneofthesespearphishingcampaigns,whetherornotit resulted in a compromise (particularly if you are a member of one of the targeted sectors), please file areportwithwww.ic3.govandreference #KimsukyCSAin the incident description.

Pleaseincludeasmuchdetailasyoucanabouttheincidentincludingthesenderemailaddressand the text of the email message, specifying any links/URLs/domains. Please specify whether you responded to the email, click on any links, or open any attachments. Pleaseretaintheoriginalemailandattachmentsincaseyouarecontactedbyaninvestigatorforfurtherinformation.

Please visit www.ic3.govanduse#KimsukyCSAinyoursubmission.

The U.S. Government also encourages victims to report suspicious activities, including any suspected DPRK cyber activities, to local FBI field offices.

For the ROK government, you can report suspicious activities to the National IntelligenceService(www.nis.go.kr,111), the theNationalPoliceAgency(ecrm.police.go.kr,182),ortheKoreaInternet& SecurityAgency(boho.or.kr,118)

KIMSUKYOPERATIONS:SOCIAL ENGINEERING

In a cybersecurity context, social engineering is a broad term referring to the use of deception to exploit human error and manipulate a target into unwittingly exposing confidential or sensitive information for fraudulent purposes. DPRK cyber actors employ social engineering techniques toenablemuchofPyongyang’smaliciousCNE.Among social engineering techniques, Kimsukyactorsuse spearphishing—or the use of fabricated emails and digital communications tailored to deceive a target—as one of their primary vectors for initiating a compromise and gaining access into a target’s-devices and networks. For over a decade, Kimsuky actors have continued to refine their socialengineeringtechniquesandmadetheirspearphishingeffortsincreasinglydifficulttodiscern.

A Kimsuky spearphishing campaign begins with broad research and preparation. DPRK cyber actors often use open-source information toidentifypotentialtargetsofvalue and then tailor their online personas to appear more realistic and appealing to their victims.

The Kimsuky actors will create email addressesthatresembleemailaddressesofrealindividuals they seek to impersonate and generatedomainsthathostthe

malicious content of a spearphishing message. DPRK actors often use domains that resemble common internet services and media sites to deceive a target.

For example, Kimsuky actors are known to impersonate well-known news outlets andjournalistsusingadomainsuchas“@XYZkoreas.news”spoofingarealnewsstationwhileactualemailsfromthenews service appear as “@XYZnews.com.”

DPRK cyber actors commonly take on the identities of real people to gain trust and establish rapport in their digital communications. Kimsuky actors may have previously compromised the email accounts of the person whom they are impersonating. This allows the actors to search for targets while scanning through compromised emails, with a particular focus on work-related files and personal information about retirees, and social clubs.

By: Zahid .H.Karani .

Advertisements
News Desk

News Desk

Welcome to our web desk! We're a dedicated team of digital enthusiasts passionate about delivering timely and engaging content to our online audience.

Related Posts

PSO Transforms Nationwide Retail Network into Pakistan’s Largest Ramadan Humanitarian Hub
Business

PSO Transforms Nationwide Retail Network into Pakistan’s Largest Ramadan Humanitarian Hub

February 11, 2026
Those hindering economic recovery are enemies of the country.
Business

Mian Zahid Hussain Welcomes Historic Surge in Pakistan-Bangladesh Relations; Success in Cricket Diplomacy and Trade Hits $866 Million.

February 11, 2026
Overseas Pakistanis’ Digital Property Registration Approved by Sindh Government is aPositive Step, Malik Muhammad Bostan
Business

Overseas Pakistanis’ Digital Property Registration Approved by Sindh Government is aPositive Step, Malik Muhammad Bostan

February 11, 2026
Al-Ghazi Tractors Limited Signs Strategic MoU with Green Agrimall to Strengthen Agricultural Mechanization in Pakistan
Business

Al-Ghazi Tractors Limited Signs Strategic MoU with Green Agrimall to Strengthen Agricultural Mechanization in Pakistan

February 11, 2026
Rakhi Sawant criticizes Jaya Bachchan, advises Amitabh to marry Rekha.
Headline

Rakhi Sawant criticizes Jaya Bachchan, advises Amitabh to marry Rekha.

February 11, 2026
Solar Investment at Risk as ‘Unit-for-Unit’ System Ends, Saquib Magoon Warns
Business

Solar Investment at Risk as ‘Unit-for-Unit’ System Ends, Saquib Magoon Warns

February 11, 2026
Camel disqualified from beauty pageant for undergoing cosmetic surgery!
Headline

Camel disqualified from beauty pageant for undergoing cosmetic surgery!

February 11, 2026
13 Exhibitors from Pakistan Make Headlines at Ambiente and Paperworld Frankfurt 2026
Business

13 Exhibitors from Pakistan Make Headlines at Ambiente and Paperworld Frankfurt 2026

February 11, 2026
DHS Urgently Calls on Gavin Newsom and Sanctuary California to Not Release 33,179 Criminal Illegal Aliens from Jails Back into California Communities
Business

DHS Urgently Calls on Gavin Newsom and Sanctuary California to Not Release 33,179 Criminal Illegal Aliens from Jails Back into California Communities

February 11, 2026
Seize the Opportunity this Ramadan: 10 Must Have WhatsApp Business Features to Supercharge Your Small Business
Business

Seize the Opportunity this Ramadan: 10 Must Have WhatsApp Business Features to Supercharge Your Small Business

February 11, 2026
Next Post
Country is at stake all shopkeepers should be included in tax net.

Country is at stake all shopkeepers should be included in tax net.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Most Popular

Korangi Causeway to Close After Malir Expressway Completion: Sindh CM

Song “Tanha Akeli Hoon,” filmed on Saba Qamar, gains popularity in the voice of Saira Peter

vivo X300 Pro is Now Available in Pakistan; The Flagship That Redefines Professional Imaging

We will live with Covid19 for months. Let’s not deny it or panic: Dr. Faheem Younus

14th International Biennial Conference held at Salim Habib University.

Must Read

I can’t walk, but I can sing: Ayesha Khan composed a Poem on the current situation
Headline

I can’t walk, but I can sing: Ayesha Khan composed a Poem on the current situation

March 31, 2020
A family with first male child after 65 years.
Headline

A family with first male child after 65 years.

December 19, 2024
The Azb is a 24/7 online news platform that covers a wide range of topics including business, economics, technology, finance, travel, fashion, and lifestyle.

Quick Links

  • Home
  • About us
  • SCI-TECH
  • Live TV
  • Banking

Useful Links

  • Videos
  • Reviews
  • Advertorial
  • Photos
  • About us
  • Author
  • Home
  • Latest News
  • Partner
  • Privacy Policy
  • Russian Theatre Group Celebrates Fifth Anniversary in Pakistan.
  • Terms and Conditions
  • The Azb – More Than Just News
  • Contact

© Copyright 2024 theazb. All Rights Reserved.

No Result
View All Result
  • HOME
  • Latest News
  • Business
  • PAKISTAN
  • SPORTS
  • WORLD
  • E-Paper
  • SCI-TECH
  • BANKING
  • ARTICLES
  • OPINION
  • MORE
    • MOBILE
    • TELECOM
    • PERSONALITY
    • HEALTH / EDUCATION

© Copyright 2024 theazb. All Rights Reserved.