黑料社

North Korean cyber spies deploy new tactic: tricking foreign experts into writing research for them

North Korea

People visit the the statues of North Korea鈥檚 founder Kim Il Sung and late leader Kim Jong Il on the 74th anniversary of North Korea鈥檚 founding, in Pyongyang, North Korea in this photo released by North Korea鈥檚 Korean Central 黑料社 Agency (KCNA) September 10, 2022. KCNA via REUTERS

SEOUL 鈥 When Daniel DePetris, a U.S.-based foreign affairs analyst, received an email in October from the director of the 38 North think-tank commissioning an article, it seemed to be business as usual.

It wasn鈥檛.

The sender was actually a suspected North Korean spy seeking information, according to those involved and three cybersecurity researchers.

Instead of infecting his computer and stealing sensitive data, as hackers typically do, the sender appeared to be trying to elicit his thoughts on North Korean security issues by pretending to be 38 North director Jenny Town.

鈥淚 realized it wasn鈥檛 legit once I contacted the person with follow up questions and found out there was, in fact, no request that was made, and that this person was also a target,鈥 DePetris told Reuters, referring to Town. 鈥淪o I figured out pretty quickly this was a widespread campaign.鈥

The email is part of a new and previously unreported campaign by a suspected North Korean hacking group, according to the cybersecurity experts, five targeted individuals and emails reviewed by Reuters.

The hacking group, which researchers dubbed Thallium or Kimsuky, among other names, has long used 鈥渟pear-phishing鈥 emails that trick targets into giving up passwords or clicking attachments or links that load malware. Now, however, it also appears to simply ask researchers or other experts to offer opinions or write reports.

According to emails reviewed by Reuters, among the other issues raised were China鈥檚 reaction in the event of a new nuclear test; and whether a 鈥渜uieter鈥 approach to North Korean 鈥渁ggression鈥 might be warranted.

鈥淭he attackers are having a ton of success with this very, very simple method,鈥 said James Elliott of the Microsoft Threat Intelligence Center (MSTIC), who added that the new tactic first emerged in January. 鈥淭he attackers have completely changed the process.鈥

MSTIC said it had identified 鈥渕ultiple鈥 North Korea experts who have provided information to a Thallium attacker account.

The experts and analysts targeted in the campaign are influential in shaping international public opinion and foreign governments鈥 policy toward North Korea, the cybersecurity researchers said.

A 2020 report by U.S. government cybersecurity agencies said Thallium has been operating since 2012 and 鈥渋s most likely tasked by the North Korean regime with a global intelligence gathering mission.鈥

Thallium has historically targeted government employees, think tanks, academics, and human rights organisations, according to Microsoft.

鈥淭he attackers are getting the information directly from the horse鈥檚 mouth, if you will, and they don鈥檛 have to sit there and make interpretations because they鈥檙e getting it directly from the expert,鈥 Elliot said.

New tactics

North Korean hackers are well-known for attacks netting millions of dollars, targeting Sony Pictures over a film seen as insulting to its leader, and stealing data from pharmaceutical and defense companies, foreign governments, and others.

North Korea鈥檚 embassy in London did not respond to a request for comment, but it has denied being involved in cyber crime.

In other attacks, Thallium and other hackers have spent weeks or months developing trust with a target before sending malicious software, said Saher Naumaan, principal threat intelligence analyst at BAE Systems Applied Intelligence.

But according to Microsoft, the group now also engages with experts in some cases without ever sending malicious files or links even after the victims respond.

This tactic can be quicker than hacking someone鈥檚 account and wading through their emails, bypasses traditional technical security programs that would scan and flag a message with malicious elements, and allows the spies direct access to the experts鈥 thinking, Elliot said.

鈥淔or us as defenders, it鈥檚 really, really hard to stop these emails,鈥 he said, adding that in most cases it comes down to the recipient being able to figure it out.

Town said some messages purporting to be from her had used an email address that ended in 鈥.live鈥 rather than her official account, which ends in 鈥.org鈥, but had copied her full signature line.

In one case, she said, she was involved in a surreal email exchange in which the suspected attacker, posing as her, included her in a reply.

DePetris, a fellow with Defense Priorities and a columnist for several newspapers, said the emails he has received were written as if a researcher were asking for a paper submission or comments on a draft.

鈥淭hey were quite sophisticated, with think tank logos attached to the correspondence to make it look as if the inquiry is legitimate,鈥 he said.

About three weeks after receiving the faked email from 38 North, a separate hacker impersonated him, emailing other people to look at a draft, DePetris said.

That email, which DePetris shared with Reuters, offers $300 for reviewing a manuscript about North Korea鈥檚 nuclear programme and asks for recommendations for other possible reviewers. Elliot said the hackers never paid anyone for their research or responses, and would never intend to.

Gathering information

Impersonation is a common method for spies around the world, but as North Korea鈥檚 isolation has deepened under sanctions and the pandemic, Western intelligence agencies believe Pyongyang has become particularly reliant on cyber campaigns, one security source in Seoul told Reuters, speaking condition of anonymity to discuss intelligence matters.

In a March 2022 report, a panel of experts that investigates North Korea鈥檚 U.N. sanctions evasions listed Thallium鈥檚 efforts as among activities that 鈥渃onstitute espionage intended to inform and assist鈥 the country鈥檚 sanctions avoidance.

Town said in some cases, the attackers have commissioned papers, and analysts had provided full reports or manuscript reviews before realizing what had happened.

DePetris said the hackers asked him about issues he was already working on, including Japan鈥檚 response to North Korea鈥檚 military activities.

Another email, purporting to be a reporter from Japan鈥檚 Kyodo 黑料社, asked a 38 North staffer how they thought the war in Ukraine factored in North Korea鈥檚 thinking, and posed questions about U.S., Chinese, and Russian policies.

鈥淥ne can only surmise that the North Koreans are trying to get candid views from think tankers in order to better understand U.S. policy on the North and where it may be going,鈥 DePetris said.

RELATED STORIES

LATEST STORIES
Read more...