Rewterz Threat Advisory – Multiple WordPress Vulnerabilities
November 30, 2021Rewterz Threat Alert – APT-C-41 StrongPity – Active IOCs
November 30, 2021Rewterz Threat Advisory – Multiple WordPress Vulnerabilities
November 30, 2021Rewterz Threat Alert – APT-C-41 StrongPity – Active IOCs
November 30, 2021Severity
High
Analysis Summary
Kimsuky is a North Korean threat actor that has been active since 2012, primarily focuses on government entities in South Korea, and conducts espionage campaigns against targets in the U.S. and Japan. The Kimsuky group can set up phishing infrastructure to effectively mimic well-known websites and trick victims to enter their credentials. “This is one of the main methods used by this actor to collect email addresses that later will be used to send spear-phishing emails.” Earleir this year, a mobile malware researcher has shared information about a fake KISA vaccine or a security android app disguised as the KISA security program deployed by Kimsuky group. When the target downloads the APK implanted file from the email and installs the application on his device, the malicious code does its job. It executes in the background without the target’s knowledge and collects sensitive information from his device.
Impact
- Data exfiltration
- Information theft and espionage
Indicators of Compromise
Filename
코빗 상장 절차 (2).docx (Korbit listing process.docx)
MD5
- 51fa8bf006d80f5e140d84df313c650f
SHA-256
- cb88d365011dce926afb1c04e6973f3d3db7135dd67d738e281f3690b8d9e6ef
SHA-1
- 126512c9bea6c5a6f15c1aba6c0d30bd9a1c76c3
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.