Rewterz Threat Alert – Government Departments Warned by NTISB about Risks of Indian and Israeli IT Products and Services
June 29, 2023Rewterz Threat Alert – “Stealc” – An Information Stealer Malware – Active IOCs
June 30, 2023Rewterz Threat Alert – Government Departments Warned by NTISB about Risks of Indian and Israeli IT Products and Services
June 29, 2023Rewterz Threat Alert – “Stealc” – An Information Stealer Malware – Active IOCs
June 30, 2023Severity
High
Analysis Summary
The Konni APT (Advanced Persistent Threat) group is a cyber espionage group that has been active since at least 2014. It is believed to be based in North Korea and is known for targeting government agencies and organizations in South Korea and the United States.
The North Korean hacker group distributes Konni RAT via phishing messages or emails. The infection chain begins when the victim accesses a weaponized file. Adversaries employ Konni RAT to gather information from victims, capture screenshots, steal files, and build a remote interactive shell. KONNI has been linked to various alleged North Korean attacks targeting political groups in Russia, East Asia, Europe, and the Middle East. KONNI shares a significant code overlap with the NOKKI malware family. Konni’s APT Group continues to attack malicious documents written in Russian. This threat actor group conducts attacks with Russian-North Korean trade and economic investment documents.
This APT group was detected targeting the Russian diplomatic sector in January 2022, employing a spear phishing theme for New Year’s Eve festivities as a bait. When the malicious email attachment is opened and processed, a series of events occur, allowing the actor to install an implant from the Konni RAT family as the final payload.
Impact
- Information Theft and Espionage
Indicators of Compromise
MD5
- 24949137f4a88bee8a11e0060a5eeb11
- 395b6399fea137783ffdac84f2d4c256
SHA-256
- e220f804878bb90b2ff36f3d479a373187cb5979ea8821d1e52d4900e4bbade8
- 9f47c41cccd9bd926402a9a7b778813031791ced1aefb62904fe9ed51a6dc6fd
SHA-1
- 396e757805d09cb9440c7188551880766c3f6af8
- ac372a2a9269e704c782d09deb99e2a0ce84f324
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.