ADVERTISEMENT
Friday, July 25, 2025
No Result
View All Result
The AZB More Than Just News
  • HOME
  • Latest News
  • Business
  • PAKISTAN
  • SPORTS
  • WORLD
  • E-Paper
  • SCI-TECH
  • BANKING
  • ARTICLES
  • OPINION
  • MORE
    • MOBILE
    • TELECOM
    • PERSONALITY
    • HEALTH / EDUCATION
  • HOME
  • Latest News
  • Business
  • PAKISTAN
  • SPORTS
  • WORLD
  • E-Paper
  • SCI-TECH
  • BANKING
  • ARTICLES
  • OPINION
  • MORE
    • MOBILE
    • TELECOM
    • PERSONALITY
    • HEALTH / EDUCATION
No Result
View All Result
Daily The Azb
No Result
View All Result
Home Headline

North Korea Using Social Engineering to Enable Hackingof Think Tanks, Academia, and Media SUMMARY.

News Desk
June 8, 2023
North Korea Using Social Engineering to Enable Hackingof Think Tanks, Academia, and Media SUMMARY.
Share on FacebookShare on Twitter
Advertisements

The Federal Bureau of Investigation (FBI), the U.S. Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by the Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation (CNE) globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations. These North Korean cyber actors are known to conduct spear phishing campaigns posing as real journalists, academics, or other individuals with credible links to North Korean policy circles. The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to private documents, research, and communications of their targets.

BACKGROUND

Advertisements

North Korea’s cyber program provides the regime with broad intelligence collection and espionage capabilities. The Governments of the United States and the Republic of Korea (ROK a.k.a. South Korea) have observed sustained information-gathering efforts originating from these North Korean cyber actors.NorthKorea’sprimarymilitaryintelligenceorganization,theReconnaissanceGeneralBureau (RGB), which has been sanctioned by the United Nations Security Council, is primarilyresponsibleforthisnetworkofactors and for activities.

We assess the primary goals of the DPRK regime’s cyber program including maintaining consistent access to current intelligence about the United States, South Korea, and other countries of interest toimpedeanypolitical, military, or economic threattotheregime’ssecurityandstability.

Currently, the U.S. and ROK Governments, and private sector cyber security companies, track a specific set of DPRKcyberactorsconductingthese large-scalesocialengineeringcampaignsas

Disclaimer: This document is marked TLP:CLEAR. Disclosure is not limited. Sources may use TLP:CLEARwhen information carries minimal or no foreseeable risk of misuse, by applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be distributed without restriction.FormoreinformationontheTrafficLightProtocol, see HTTPS://www.cisa.gov/tlp.

Kimsuky, Thallium, APT43, Velvet Chollima, and Black Banshee. Kimsuky is administratively subordinate to an element within North Korea’s RGB and has conducted broad cyber campaigns in support of RGB objectives since at least 2012. Kimsuky actors’ primary mission is to provide stolendataandvaluable geopoliticalinsighttothe NorthKoreanregime.

Some targeted entities may discount the threat posed by these social engineering campaigns, either because they do not perceive their research and communications as sensitive, or because they are not aware of how these efforts fuel the regime’s broader cyberespionage efforts. However, as outlined in this advisory, North Korea relies heavily on intelligence gained by compromising policy analysts. Further, successful compromises enable Kimsuky actors to craft more credible and effective spearphishing emails that can be leveraged against more sensitive, higher-value targets. The authoring agencies believe that raising awareness of some of these campaigns and employing basic cyber security practices may frustrate the effectiveness of Kimsuky’s spearphishing operations. This advisory provides detailed information on how Kimsuky actors operate; red flags to consider as you encounter common themes and campaigns; and general mitigation measures for entities worldwide toimplementtobetterprotectagainstKimsuky’s CNE operations.

Ifyoubelieveyouhavebeentargetedinoneofthesespearphishingcampaigns,whetherornotit resulted in a compromise (particularly if you are a member of one of the targeted sectors), please file areportwithwww.ic3.govandreference #KimsukyCSAin the incident description.

Pleaseincludeasmuchdetailasyoucanabouttheincidentincludingthesenderemailaddressand the text of the email message, specifying any links/URLs/domains. Please specify whether you responded to the email, click on any links, or open any attachments. Pleaseretaintheoriginalemailandattachmentsincaseyouarecontactedbyaninvestigatorforfurtherinformation.

Please visit www.ic3.govanduse#KimsukyCSAinyoursubmission.

The U.S. Government also encourages victims to report suspicious activities, including any suspected DPRK cyber activities, to local FBI field offices.

For the ROK government, you can report suspicious activities to the National IntelligenceService(www.nis.go.kr,111), the theNationalPoliceAgency(ecrm.police.go.kr,182),ortheKoreaInternet& SecurityAgency(boho.or.kr,118)

KIMSUKYOPERATIONS:SOCIAL ENGINEERING

In a cybersecurity context, social engineering is a broad term referring to the use of deception to exploit human error and manipulate a target into unwittingly exposing confidential or sensitive information for fraudulent purposes. DPRK cyber actors employ social engineering techniques toenablemuchofPyongyang’smaliciousCNE.Among social engineering techniques, Kimsukyactorsuse spearphishing—or the use of fabricated emails and digital communications tailored to deceive a target—as one of their primary vectors for initiating a compromise and gaining access into a target’s-devices and networks. For over a decade, Kimsuky actors have continued to refine their socialengineeringtechniquesandmadetheirspearphishingeffortsincreasinglydifficulttodiscern.

A Kimsuky spearphishing campaign begins with broad research and preparation. DPRK cyber actors often use open-source information toidentifypotentialtargetsofvalue and then tailor their online personas to appear more realistic and appealing to their victims.

The Kimsuky actors will create email addressesthatresembleemailaddressesofrealindividuals they seek to impersonate and generatedomainsthathostthe

malicious content of a spearphishing message. DPRK actors often use domains that resemble common internet services and media sites to deceive a target.

For example, Kimsuky actors are known to impersonate well-known news outlets andjournalistsusingadomainsuchas“@XYZkoreas.news”spoofingarealnewsstationwhileactualemailsfromthenews service appear as “@XYZnews.com.”

DPRK cyber actors commonly take on the identities of real people to gain trust and establish rapport in their digital communications. Kimsuky actors may have previously compromised the email accounts of the person whom they are impersonating. This allows the actors to search for targets while scanning through compromised emails, with a particular focus on work-related files and personal information about retirees, and social clubs.

By: Zahid .H.Karani .

Advertisements
News Desk

News Desk

Welcome to our web desk! We're a dedicated team of digital enthusiasts passionate about delivering timely and engaging content to our online audience.

Related Posts

UNSC adopts Pakistan-sponsored resolution for peaceful conflict settlement
ARTICLES

UNSC adopts Pakistan-sponsored resolution for peaceful conflict settlement

July 25, 2025
MG Motors and Bank Alfalah Launches a ‘Freedom Package’ with an Instant Vehicle Delivery and Auto Financing
Business

MG Motors and Bank Alfalah Launches a ‘Freedom Package’ with an Instant Vehicle Delivery and Auto Financing

July 25, 2025
The ombudsman Secretariat shall sign the M.O.U with Pakistan Red Crescent Sindh for the Humanitarian Assistance to the Most Vulnerable in Sindh.
Headline

The ombudsman Secretariat shall sign the M.O.U with Pakistan Red Crescent Sindh for the Humanitarian Assistance to the Most Vulnerable in Sindh.

July 24, 2025
11th ISEM Solar Exhibition 2025 Opens at Expo Center Karachi
Headline

11th ISEM Solar Exhibition 2025 Opens at Expo Center Karachi

July 24, 2025
SHCC decided to take action against unregistered Healthcare Establishments Board of Commissioners approved PKR 15 million penalty against 224 quacks
Headline

SHCC decided to take action against unregistered Healthcare Establishments Board of Commissioners approved PKR 15 million penalty against 224 quacks

July 24, 2025
Altaf Hussain Discharged from London Hospital After Recovering from Serious Illness
Headline

Altaf Hussain Discharged from London Hospital After Recovering from Serious Illness

July 24, 2025
Pak pharma sector has limitless potential in Africa.
Headline

Pakistan’s Pharmaceutical Exports Surge 34%, Marking Highest Growth in Two Decades

July 24, 2025
How to Watch the UEFA Women’s Euro 2025 Final Live Online — Free Streaming Options
Headline

How to Watch the UEFA Women’s Euro 2025 Final Live Online — Free Streaming Options

July 24, 2025
Karachi Couple Caught Distributing Fake Currency in Abbottabad; Rs136,000 in Counterfeit Notes Seized
Headline

Karachi Couple Caught Distributing Fake Currency in Abbottabad; Rs136,000 in Counterfeit Notes Seized

July 24, 2025
Punjab to Launch E-Taxi Scheme in August — Special Quota for Women Drivers
Headline

Punjab to Launch E-Taxi Scheme in August — Special Quota for Women Drivers

July 24, 2025
Next Post
Country is at stake all shopkeepers should be included in tax net.

Country is at stake all shopkeepers should be included in tax net.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Most Popular

PM Youth Laptop Scheme 2025: HEC Releases Merit List – Check Your Eligibility Online Now!

Improving Pakistan’s Response to Gender-Based Violence – A discussion on implementation of the Anti-Rape Act 2021.

Yinyleon & her husband most viewed amateurs 2022 on adult site.

Reckitt Benckiser (RB) & partners to revolutionize access of health & hygiene across 1 million rural households, backed by the UK Government

Mehwish Salman Ali Elected President of CxO Global Forum USA Chapter

Must Read

SPORTPecco Bagnaia won the Sprint Race of the Italian Grand Prix at Mugello
Headline

Pecco Bagnaia Triumphs in Thrilling Italian Grand Prix Sprint Race at Mugello

June 3, 2024
Pakistani Artists win Gold Awards in India
Headline

Pakistani Artists win Gold Awards in India

August 15, 2022
The Azb is a 24/7 online news platform that covers a wide range of topics including business, economics, technology, finance, travel, fashion, and lifestyle.

Quick Links

  • Home
  • About us
  • SCI-TECH
  • Live TV
  • Banking

Useful Links

  • Videos
  • Reviews
  • Advertorial
  • Photos
  • About us
  • Author
  • Home
  • Latest News
  • Partner
  • Privacy Policy
  • Russian Theatre Group Celebrates Fifth Anniversary in Pakistan.
  • Terms and Conditions
  • The Azb – More Than Just News
  • Contact

© Copyright 2024 theazb. All Rights Reserved.

No Result
View All Result
  • HOME
  • Latest News
  • Business
  • PAKISTAN
  • SPORTS
  • WORLD
  • E-Paper
  • SCI-TECH
  • BANKING
  • ARTICLES
  • OPINION
  • MORE
    • MOBILE
    • TELECOM
    • PERSONALITY
    • HEALTH / EDUCATION

© Copyright 2024 theazb. All Rights Reserved.