Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
North Korean Hackers Evolve Malware, Merging BeaverTail and OtterCookie
Advertisements

Threat Actor Refines Toolset in New Campaigns

A North Korean threat actor, previously associated with the “Contagious Interview” campaign, has been observed enhancing its cyber arsenal by merging functionalities from its BeaverTail and OtterCookie malware. According to new research from Cisco Talos, this development indicates the hacking group is actively refining its toolset. Recent campaigns show a significant convergence of the two malware programs’ functions. This evolution of their malicious software demonstrates a persistent effort by the group to improve its operational capabilities and evade detection.

In addition to combining features, the group has upgraded its OtterCookie malware. The program has been fitted with a new module designed for advanced surveillance, including capabilities for keylogging and capturing screenshots from compromised systems. This enhancement provides the attackers with more effective methods for stealing sensitive information and monitoring victim activity.

Attribution and Advanced Payload Delivery

The activity is attributed to a threat cluster tracked by cybersecurity experts under numerous aliases, including CL-STA-0240, DeceptiveDevelopment, Famous Chollima, Gwisin Gang, PurpleBravo, Tenacious Pungsan, UNC5342, and Void Dokkaebi. The wide range of monikers reflects the extensive tracking of this group’s activities across the security industry.

This development follows a report from Google Threat Intelligence Group (GTIG) and Mandiant that revealed the threat actor’s use of a sophisticated technique known as EtherHiding. This stealthy method is employed to fetch next-stage payloads from the BNB Smart Chain, highlighting the group’s use of blockchain technology to conceal its command-and-control infrastructure and payload delivery mechanisms.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading