fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

US Shares Info On North Korean Malware Used To Steal Cryptocurrency

US Shares Info On North Korean Malware Used To Steal Cryptocurrency

The FBI, CISA, and US Department of Treasury shared detailed info on malicious and fake crypto-trading applications used by North Korean-backed state hackers to steal cryptocurrency from individuals and companies worldwide in a joint advisory published on Wednesday.

These cryptocurrency trading apps were developed and injected with AppleJeus malware by a DPRK state-sponsored threat actor known as Lazarus Group (tracked by the U.S. as HIDDEN COBRA).

“These cyber actors have targeted organizations for cryptocurrency theft in over 30 countries during the past year alone,” the advisory reads.

“It is likely that these actors view modified cryptocurrency trading applications as a means to circumvent international sanctions on North Korea—the applications enable them to gain entry into companies that conduct cryptocurrency transactions and steal cryptocurrency from victim accounts.”

Also Read: How To Prevent WhatsApp Hack: 7 Best Practices

AppleJeus malware analysis reports

Along with the joint advisory, the US agencies have also released seven malware analysis reports with indicators of compromise (IOCs) and information on each of the North Korean APT’s malicious apps used in this far-reaching and wide-ranging cryptocurrency theft campaign. 

The hacking group developed and used several versions of AppleJeus since the malware was initially detected in 2018.

Multiple AppleJeus versions have been spotted in the wild after it was first discovered. Most of them are delivered as apparently benign apps via attacker-controlled sites mimicking legitimate-looking cryptocurrency trading sites and companies.

“Initially, HIDDEN COBRA actors used websites that appeared to host legitimate cryptocurrency trading platforms to infect victims with AppleJeus; however, these actors are now also using other initial infection vectors, such as phishing, social networking, and social engineering techniques, to get users to download the malware,” CISA said.

CISA has released the following seven Malware Analysis Reports (MARs) with full technical details on the AppleJeus malware, mitigation recommendations, and highlighting the cryptocurrency threat posed by the North Korean APT:

“This advisory marks another step by the U.S. Government to counter the ongoing and criminal North Korean global cryptocurrency theft scheme targeting finance, energy, and other sectors,” Matt Hartman, CISA Acting Executive Assistant Director of Cybersecurity, said

“The FBI, Treasury, and CISA continue to assess the evolving cyber threat posed by North Korea, cybercriminals, and other nation-state actors and are committed to providing organizations timely information and mitigations to combat these threats.”

Also Read: 15 Best Tools For Your Windows 10 Privacy Settings Setup

North Koreans charged and sanctioned for theft of cryptocurrency

The U.S. Justice Department charged three North Koreans yesterday for stealing $1.3 billion in money and cryptocurrency in attacks on banks, the entertainment industry, cryptocurrency companies, and other organizations.

They are believed to be members of Reconnaissance General Bureau (RGB) units, a North Korean military intelligence agency.

“These North Korean military hacking units are known by multiple names in the cybersecurity community, including Lazarus Group and Advanced Persistent Threat 38 (APT38),” the DOJ said.

A confidential United Nations report previously said in 2019 that North Korean operators stole an estimated $2 billion following at least 35 cyberattacks on banks and cryptocurrency exchanges across more than a dozen countries.

The same year, the U.S. Treasury sanctioned three North Korean hacking groups (Lazarus Group, Bluenoroff, and Andariel) for funneling stolen financial assets to the North Korean government.

More info on North Korean-backed malicious cyber activity tracked by the U.S. Government as HIDDEN COBRA can be found here.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us