The cyberspies used fake Twitter and LinkedIn social media accounts to get in contact with the victims. Experts identified two accounts impersonating recruiters for antivirus and security companies. Social media profiles were quickly removed after Google reported them to the respective platforms.
Google researchers discovered that threat actors also created a website for a fake cybersecurity firm named SecuriElite offering offensive security services, including pentests, security assessments, and exploits.
Experts noticed that the website used in this campaign has a link to a PGP public key which is the same that was found on attackers’ blog in a campaign spotted in January.
“On March 17th, the same actors behind those attacks set up a new website with associated social media profiles for a fake company called “SecuriElite.”” reads the post published by Google TAG.
“The new website claims the company is an offensive security company located in Turkey that offers pentests, software security assessments and exploits. Like previous websites we’ve seen set up by this actor, this website has a link to their PGP public key at the bottom of the page. In January, targeted researchers reported that the PGP key hosted on the attacker’s blog acted as the lure to visit the site where a browser exploit was waiting to be triggered.
Unlike January campaign, the website of SecuriElite site wasn’t yet to host malicious exploits to deliver malware.
In January the attackers employed an Internet Explorer 0-day vulnerability in their attacks, but TAG researchers believe that these actors likely have more 0-days exploits in their code.
“At this time, we have not observed the new attacker website serve malicious content, but we have added it to Google Safebrowsing as a precaution,” Threat Analysis Group’s researchers conclude. “Based on their activity, we continue to believe that these actors are dangerous, and likely have more 0-days.
The hackers employed a custom backdoor to compromise the systems of the vulnerability researchers.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
(SecurityAffairs – hacking, North Korea)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.