Mon | Jun 5, 2023 | 4:30 AM PDT

United States and South Korean government agencies have jointly released a cybersecurity advisory shedding light on the cyber threat posed by the Democratic People's Republic of Korea (DPRK).

Specifically, the advisory highlights the utilization of social engineering techniques by DPRK state-sponsored cyber actors, with a focus on their hacking activities targeting think tanks, academia, and media organizations worldwide. At the forefront of these cyber threats is a group known as Kimsuky.

Social engineering and Kimsuky's operations

Social engineering refers to the deceptive manipulation of human psychology and trust to exploit individuals and gain access to confidential or sensitive information. Kimsuky, a cyber actor group administratively subordinate to North Korea's Reconnaissance General Bureau (RGB), has been actively engaging in social engineering campaigns since at least 2012, the advisory states.

Using spearphishing as their primary tactic, Kimsuky actors pose as journalists, academics, or individuals closely linked to North Korean policy circles. They meticulously craft their online personas, often impersonating real people to appear credible and appeal to their targets. The group conducts extensive research and preparation, employing open-source information to identify potential high-value targets.

Kimsuky actors tailor their spearphishing campaigns to specific themes based on the interests of their targets. They continuously refine their techniques, making their malicious emails increasingly difficult to discern. The following are some of the observed themes and techniques employed by Kimsuky:

  1. Impersonation of journalists: By spoofing real journalists and broadcast writers, Kimsuky actors create a credible front. They make inquiries to prominent individuals involved in North Korea matters, seeking insights into current events and foreign policy strategies.

  2. Impersonation of academic scholars: Kimsuky actors impersonate South Korean academic scholars to target researchers at think tanks. They send spearphishing emails, posing as scholars conducting surveys or requesting email interviews on North Korean nuclear issues and denuclearization.

  3. Impersonation of think tank researchers: The group also impersonates researchers from legitimate South Korean think tanks. They initiate genuine communication to establish rapport and gather opinions on various topics, such as North Korea's foreign policy.

  4. Impersonation of government officials and web administrators: Kimsuky actors may impersonate individuals responsible for North Korean policies in government agencies, such as the South Korean National Assembly or the presidential office. By mentioning specific information obtained from compromised email accounts, they aim to gain the trust of their targets.

The advisory emphasizes the importance of raising awareness among potential targets of these social engineering campaigns. Many targeted entities may underestimate the threat, either due to their perception of the sensitivity of their research or unawareness of the broader cyber espionage efforts fueled by these campaigns.

Both U.S. and South Korean governments are urging individuals to report any suspicious activities, particularly those associated with suspected cyber activities conducted by the DPRK.

By sharing information about past or ongoing DPRK activities in cyberspace through the Department of State's Rewards for Justice program, individuals could potentially receive a reward of up to $5 million. For more information and specific details, individuals can visit the website https://rewardsforjustice.net/.

The cybersecurity landscape continues to evolve, and the threat posed by state-sponsored cyber actors like Kimsuky remains a significant concern. 

By understanding Kimsuky's techniques and adopting proactive cybersecurity measures, entities can better protect themselves against North Korea's cyber espionage efforts.

Follow SecureWorld News for more stories related to cybersecurity.

Comments