Watering hole attack found on popular North Korean-themed news site
A North Korean cyber-espionage group has breached one of the most popular North Korean-themed news sites on the internet in order to carry out a watering hole attack and infect some of the site's visitors with malware.
The watering hole attack lasted from at least late March 2021 until early June 2021, security firm Volexity said in a report yesterday.
According to Volexity, the attackers leveraged CVE-2020-1380, a vulnerability in the old IE, and CVE-2021-26411, a newer exploit in the IE and legacy Edge browsers. For both vulnerabilities, the threat actor used public proof-of-concept code posted online in previous months[1, 2], the Volexity team said.
The final payloads of these attacks differed across time but included a Cobalt Strike backdoor beacon, which could be used to deploy other malware, or a new malware strain called BlueLight, which could be used to download and execute shellcode or other apps or search through local files.
The breadth of the attack and how many users were infected are currently unknown.
The Daily NK website is one of the Top 50,000 most popular websites on the internet, according to the Tranco unified traffic ranking. The website, operated out of South Korea and published in English, is known for its coverage of North Korean topics and is considered a top source and subject matter experts on North Korean politics.
Volexity pinned the intrusion into Daily NK's servers on a North Korean cyber-espionage group known in the cyber-security community under codenames such as APT37, ScarCruft, Ricochet Chollima, and InkySquid.
A spokesperson for the Daily NK did not return a request for comment sent by The Record yesterday.
Catalin Cimpanu is a cybersecurity reporter for The Record. He previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement actions against hackers.