North Korean Hackers Exploited Seoul Stampede To Distribute Malware, Says Google


(MENAFN- Khaleej Times)

Hackers backed by the North Korean government referenced the deadly Halloween crush in Seoul to distribute malware to users in South Korea, Google's Threat Analysis group said in a report.

The malware was embedded in Microsoft Office documents which purported to be a government report on the tragedy that killed more than 150 people, after tens of thousands of young revellers crowded into narrow alleyways.

'This incident was widely reported on, and the lure takes advantage of widespread public interest in the accident,' the Threat Analysis Group said.

Google attributed the activity to a North Korean hacking group known as APT37, which it said targets South Korean users, North Korean defectors, policy makers, journalists, and human rights activists.

ALSO READ:

  • seoul halloween crush: president yoon apologises, vows justice
  • seoul stampede: police officer investigated over incident found dead at home

The tech giant also said that it had not determined what the malware - which exploited an Internet Explorer vulnerability - was intended to achieve. It reported the problem to Microsoft on October 31, after multiple reports from South Korean users on the same day. Microsoft issued a patch on November 8.

A United Nations panel of experts that monitors sanctions on North Korea has accused Pyongyang of using stolen funds gained through hacking to support its nuclear and ballistic missile programmes to circumvent sanctions.

North Korea does not respond to media inquiries, but has previously released statements denying allegations of hacking.

On Thursday, South Korean officials warned businesses against inadvertently hiring IT staff from North Korea.

In May, the United States issued a similar advisory, saying that rogue North Korean freelancers were taking advantage of remote work opportunities to hide their true identities and earn money for Pyongyang.

MENAFN07122022000049011007ID1105282921


Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.