US-CERT- AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

Started by Netwörkheäd, October 27, 2020, 06:12:14 PM

Previous topic - Next topic

Netwörkheäd

AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

[html]Original release date: October 27, 2020

Summary

This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the https://attack.mitre.org/versions/v7/techniques/enterprise/">ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques.



This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Cyber Command Cyber National Mission Force (CNMF). This advisory describes the tactics, techniques, and procedures (TTPs) used by North Korean advanced persistent threat (APT) group https://attack.mitre.org/groups/G0094/">Kimsuky—against worldwide targets—to gain intelligence on various topics of interest to the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https://us-cert.cisa.gov/northkorea">https://www.us-cert.cisa.gov/northkorea.



This advisory describes known Kimsuky TTPs, as found in open-source and intelligence reporting through July 2020. The target audience for this advisory is commercial sector businesses desiring to protect their networks from North Korean APT activity.



https://us-cert.cisa.gov/sites/default/files/publications/TLP-WHITE_AA20-301A_North_Korean_APT_Focus_Kimsuky.pdf">Click here for a PDF version of this report.



Key Findings



This advisory's key findings are:




Technical Details

Initial Access



Kimsuky uses various spearphishing and social engineering methods to obtain Initial Access [https://attack.mitre.org/tactics/TA0001/">TA0001] to victim networks.[https://blog.malwarebytes.com/threat-analysis/2020/04/apts-and-covid-19-how-advanced-persistent-threats-use-the-coronavirus-as-a-lure/">9],[https://www.pwc.co.uk/issues/cyber-security-services/research/tracking-kimsuky-north-korea-based-cyber-espionage-group-part-2.html">10],[https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf">11] Spearphishing—with a malicious attachment embedded in the email—is the most observed Kimsuky tactic (Phishing: Spearphishing Attachment [https://attack.mitre.org/versions/v7/techniques/T1566/001/">T1566.001]).[https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia">12],[https://attack.mitre.org/groups/G0094/">13]




       
  • The APT group has used web hosting credentials—stolen from victims outside of their usual targets—to host their malicious scripts and tools. Kimsuky likely obtained the credentials from the victims via spearphishing and credential harvesting scripts. On the victim domains, they have created subdomains mimicking legitimate sites and services they are spoofing, such as Google or Yahoo mail.[14]

  •    
  • Kimsuky has also sent benign emails to targets, which were possibly intended to build trust in advance of a follow-on email with a malicious attachment or link.
       

            
    • Posing as South Korean reporters, Kimsuky exchanged several benign interview-themed emails with their intended target to ostensibly arrange an interview date and possibly build rapport. The emails contained the subject line "Skype Interview requests of [Redacted TV Show] in Seoul," and began with a request to have the recipient appear as a guest on the show. The APT group invited the targets to a Skype interview on the topic of inter-Korean issues and denuclearization negotiations on the Korean Peninsula.

    •       
    • After a recipient agreed to an interview, Kimsuky sent a subsequent email with a malicious document, either as an attachment or as a Google Drive link within the body. The document usually contained a variant of BabyShark malware (see the Execution section for information on BabyShark). When the date of the interview drew near, Kimsuky sent an email canceling the interview.

    •    

       

  •    
  • Kimsuky tailors its spearphishing and social engineering approaches to use topics relevant to the target, such as COVID-19, the North Korean nuclear program, or media interviews.[https://cyware.com/news/babyshark-malware-continues-to-target-nuclear-and-cryptocurrency-industries-40e04829">15],[https://blog.malwarebytes.com/threat-analysis/2020/04/apts-and-covid-19-how-advanced-persistent-threats-use-the-coronavirus-as-a-lure/">16],[https://www.cyberscoop.com/north-korea-accelerate-commercial-espionage-meet-kims-economic-deadline/">17]



Kimsuky's other methods for obtaining initial access include login-security-alert-themed phishing emails, watering hole attacks, distributing malware through torrent sharing sites, and directing victims to install malicious browser extensions (Phishing: Spearphising Link [https://attack.mitre.org/versions/v7/techniques/T1566/002/">T1566.002], Drive-by Compromise [https://attack.mitre.org/versions/v7/techniques/T1189/">T1189], Man-in-the-Browser [https://attack.mitre.org/versions/v7/techniques/T1185/">T1185]).[https://attack.mitre.org/groups/G0094/">18]



Execution



After obtaining initial access, Kimsuky uses https://attack.mitre.org/software/S0414/">BabyShark malware and PowerShell or the Windows Command Shell for Execution [https://attack.mitre.org/versions/v7/tactics/TA0002/">TA0002].





Persistence



Kimsuky has demonstrated the ability to establish Persistence [https://attack.mitre.org/versions/v7/tactics/TA0003/">TA0003] through using malicious browser extensions, modifying system processes, manipulating the autostart execution, using Remote Desktop Protocol (RDP), and changing the default file association for an application. By using these methods, Kimsuky can gain login and password information and/or launch malware outside of some application allowlisting solutions.





Privilege Escalation



Kimsuky uses well-known methods for Privilege Escalation [https://attack.mitre.org/versions/v7/tactics/TA0004/">TA0004]. These methods include placing scripts in the Startup folder, creating and running new services, changing default file associations, and injecting malicious code in explorer.exe.







Figure 1: Privileges set for the injection [https://yoroi.company/research/the-north-korean-kimsuky-apt-keeps-threatening-south-korea-evolving-its-ttps/">37]



Defense Evasion



Kimsuky uses well-known and widely available methods for Defense Evasion [https://attack.mitre.org/versions/v7/tactics/TA0005/">TA0005] within a network. These methods include disabling security tools, deleting files, and using Metasploit.[https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/">38],[https://attack.mitre.org/groups/G0094/">39]





Machine generated alternative text:<br />1 <br />2 <br />3 <br />4 <br />5 <br />6 <br />7 <br />8 <br />9 <br />lø <br />SYSTEMCurrentControlSetServicesSharedAccessParameters <br />Fi rewal i cyStandardProfi le <br />SYSTEMCurrentControlSetServicesSharedAccessParameters <br />Fi rewal icyPublicProfile <br />HKLMSOFTWAREAhnLabV31S2ØØ71nternetSec <br />FWRunMode ø <br />HKLMSOFTWAREAhn1abV31S8Øis <br />fwmode ø

Let's not argue. Let's network!