On March 20, Korea’s National Intelligence Service (NIS) and Germany’s Federal Office for the Protection of the Constitution (Bundesamt für Verfassungsschutz, BfV) released a joint security advisory related to the Kimsuky hacker group. According to the joint security advisory, the Kimsuky hacker group exploited the extension feature of Chromium browsers and the app developer support feature for Android in an attack campaign to steal account credentials. Although their primary targets are Korean Peninsula and North Korea experts, it was stated that it could expand to unspecified individuals around the world.
- Title: Warning on KIMSUKY Cyber Actor’s Recent Cyber Campaigns against Google’s Browser and App Store Services
- Security Advisory: Korea’s National Cyber Security Center (NCSC) Link
AhnLab detects the Indicator of Compromise (IoC) files published in the joint advisory in the following way.
IoC MD5 | Detection Name | Engine Version |
012d5ffe697e33d81b9e7447f4aa338b | Configuration files are not targeted for detection | – |
51527624e7921a8157f820eb0ca78e29 | Backdoor/JS.Agent.SC182439 | 2022.11.02.03 |
582a033da897c967faade386ac30f604 | Backdoor/JS.Agent.SC182438 | 2022.11.02.03 |
04bb7e1a0b4f830ed7d1377a394bc717 | Android-Trojan/Kimsuky | 2022.10.27.00 |
89f97e1d68e274b03bc40f6e06e2ba9a | Android-Trojan/FastSpy | 2022.10.28.05 |
3458daa0dffdc3fbb5c931f25d7a1ec0 | Android-Trojan/Kimsuky | 2022.12.15.01 |
Subscribe to AhnLab’s next-generation threat intelligence platform ‘AhnLab TIP’ to check related IOC and detailed analysis information.
Categories:Malware Information
[…] post Overview of AhnLab’s Response to “Korea-Germany Joint Cyber Security Advice” appeared first on ASEC […]