ESTsecurity, an advisory warning about hacking linked to the North, disguised as a questionnaire for opinion gathering targeting North Korean defectors

ESTsecurity, an advisory warning about hacking linked to the North, disguised as a questionnaire for opinion gathering targeting North Korean defectors

ESTsecurity, an advisory warning about hacking linked to the North, disguised as a questionnaire for opinion gathering targeting North Korean defectors

ESTsecurity, an advisory warning about hacking linked to the North, disguised as a questionnaire for opinion gathering targeting North Korean defectors

broad

2022. 5. 9.

22. 5. 9.

A hacking attack was launched, disguised as a document for a survey soliciting opinions from the Advisory Committee for North Korean Defectors

A hacking attack was launched, disguised as a document for a survey soliciting opinions from the Advisory Committee for North Korean Defectors

A hacking attack was launched, disguised as a document for a survey soliciting opinions from the Advisory Committee for North Korean Defectors

A hacking attack was launched, disguised as a document for a survey soliciting opinions from the Advisory Committee for North Korean Defectors

ESTsecurity, an advisory warning about hacking linked to the North, disguised as a questionnaire for opinion gathering targeting North Korean defectors
ESTsecurity, an advisory warning about hacking linked to the North, disguised as a questionnaire for opinion gathering targeting North Korean defectors

Security specialist company ESTsecurity (Representative Jung Jin-il) reported on the 9th that a hacking attack linked to North Korea, disguised as collecting opinions from advisers for North Korean defectors, has been discovered and requires special attention.

The characteristic of this attack is that it is disguised as a survey to collect opinions from advisers for North Korean defectors.
The attacker exploited the OLE (Object Linking and Embedding) feature within the HWP Korean document, and when the document is executed, a fake message window ‘This document was created in a higher version.’
The contents of the window, which include prompting a natural click, are commonly seen in HWP documents and if the [Confirm] button is clicked without suspicion, one is directly exposed to the hacking attack. According to the analysis by ESTsecurity's Security Response Center (hereinafter referred to as ESRC), a malicious OLE file is embedded inside the HWP file, and it has been confirmed that the OLE contains a function that attempts to communicate with the specific domestic server ‘hanainternational[.]net’ through batch (Bat) file and PowerShell commands.

In particular, when attempting to communicate with the Command and Control (C2) server, a condition that behaves like a latent function in task scheduler was added to hide the exposure as much as possible, and it was identified that it used a tactic disguised as an ESTsoft program. Meanwhile, the Free North Korea Movement Alliance has claimed that on April 25 and 26, over two days, it scattered about 1 million leaflets to North Korea using 20 large ad balloons in the Gimpo area of Gyeonggi Province, and the malicious file was used in a timely manner for the attack by impersonating the collection of opinions on the aforementioned issue.

Thus, attention should be paid to cyber threat strategies that aim to maximize the effect of attacks by borrowing content that is known through actual media outlets, etc.
The ESRC discovered that just like the phishing attack impersonating the UN Human Rights Office in February, this attack also used a domestic server as an intermediate hacking point, and commonalities such as identical task scheduler names, ‘PEACE’, and ‘Lailey’ IDs have been found. As with this attack utilizing the OLE method rather than a vulnerability in HWP itself, recent reports suggest that all users of Hancom Office, from previous products to the latest versions, need to be more cautious when presented with a separate message window prompting them to click.

Particularly, the HWP attack methods and tactical commands used in this attack have been analyzed to match previous North Korean-linked cyberattack cases, indicating that a North Korean cyber threat organization is suspected to be behind these efforts. Mr. Moon Jong-hyun, the director of the ESRC center, stated, "Although spear phishing attacks based on malicious HWP documents have significantly decreased from before, they still represent an ignored threat that is consistently witnessed in covert targeted attacks. As North Korea-linked cyber threats continue to increase day by day, closer public-private coordination and cooperation are important," he urged.

Meanwhile, ESTsecurity's ESRC is closely sharing information related to these cyber threats with related authorities such as the Korea Internet & Security Agency (KISA) to maintain cooperation to prevent the spread of previously known threats.

Security specialist company ESTsecurity (Representative Jung Jin-il) reported on the 9th that a hacking attack linked to North Korea, disguised as collecting opinions from advisers for North Korean defectors, has been discovered and requires special attention.

The characteristic of this attack is that it is disguised as a survey to collect opinions from advisers for North Korean defectors.
The attacker exploited the OLE (Object Linking and Embedding) feature within the HWP Korean document, and when the document is executed, a fake message window ‘This document was created in a higher version.’
The contents of the window, which include prompting a natural click, are commonly seen in HWP documents and if the [Confirm] button is clicked without suspicion, one is directly exposed to the hacking attack. According to the analysis by ESTsecurity's Security Response Center (hereinafter referred to as ESRC), a malicious OLE file is embedded inside the HWP file, and it has been confirmed that the OLE contains a function that attempts to communicate with the specific domestic server ‘hanainternational[.]net’ through batch (Bat) file and PowerShell commands.

In particular, when attempting to communicate with the Command and Control (C2) server, a condition that behaves like a latent function in task scheduler was added to hide the exposure as much as possible, and it was identified that it used a tactic disguised as an ESTsoft program. Meanwhile, the Free North Korea Movement Alliance has claimed that on April 25 and 26, over two days, it scattered about 1 million leaflets to North Korea using 20 large ad balloons in the Gimpo area of Gyeonggi Province, and the malicious file was used in a timely manner for the attack by impersonating the collection of opinions on the aforementioned issue.

Thus, attention should be paid to cyber threat strategies that aim to maximize the effect of attacks by borrowing content that is known through actual media outlets, etc.
The ESRC discovered that just like the phishing attack impersonating the UN Human Rights Office in February, this attack also used a domestic server as an intermediate hacking point, and commonalities such as identical task scheduler names, ‘PEACE’, and ‘Lailey’ IDs have been found. As with this attack utilizing the OLE method rather than a vulnerability in HWP itself, recent reports suggest that all users of Hancom Office, from previous products to the latest versions, need to be more cautious when presented with a separate message window prompting them to click.

Particularly, the HWP attack methods and tactical commands used in this attack have been analyzed to match previous North Korean-linked cyberattack cases, indicating that a North Korean cyber threat organization is suspected to be behind these efforts. Mr. Moon Jong-hyun, the director of the ESRC center, stated, "Although spear phishing attacks based on malicious HWP documents have significantly decreased from before, they still represent an ignored threat that is consistently witnessed in covert targeted attacks. As North Korea-linked cyber threats continue to increase day by day, closer public-private coordination and cooperation are important," he urged.

Meanwhile, ESTsecurity's ESRC is closely sharing information related to these cyber threats with related authorities such as the Korea Internet & Security Agency (KISA) to maintain cooperation to prevent the spread of previously known threats.

Security specialist company ESTsecurity (Representative Jung Jin-il) reported on the 9th that a hacking attack linked to North Korea, disguised as collecting opinions from advisers for North Korean defectors, has been discovered and requires special attention.

The characteristic of this attack is that it is disguised as a survey to collect opinions from advisers for North Korean defectors.
The attacker exploited the OLE (Object Linking and Embedding) feature within the HWP Korean document, and when the document is executed, a fake message window ‘This document was created in a higher version.’
The contents of the window, which include prompting a natural click, are commonly seen in HWP documents and if the [Confirm] button is clicked without suspicion, one is directly exposed to the hacking attack. According to the analysis by ESTsecurity's Security Response Center (hereinafter referred to as ESRC), a malicious OLE file is embedded inside the HWP file, and it has been confirmed that the OLE contains a function that attempts to communicate with the specific domestic server ‘hanainternational[.]net’ through batch (Bat) file and PowerShell commands.

In particular, when attempting to communicate with the Command and Control (C2) server, a condition that behaves like a latent function in task scheduler was added to hide the exposure as much as possible, and it was identified that it used a tactic disguised as an ESTsoft program. Meanwhile, the Free North Korea Movement Alliance has claimed that on April 25 and 26, over two days, it scattered about 1 million leaflets to North Korea using 20 large ad balloons in the Gimpo area of Gyeonggi Province, and the malicious file was used in a timely manner for the attack by impersonating the collection of opinions on the aforementioned issue.

Thus, attention should be paid to cyber threat strategies that aim to maximize the effect of attacks by borrowing content that is known through actual media outlets, etc.
The ESRC discovered that just like the phishing attack impersonating the UN Human Rights Office in February, this attack also used a domestic server as an intermediate hacking point, and commonalities such as identical task scheduler names, ‘PEACE’, and ‘Lailey’ IDs have been found. As with this attack utilizing the OLE method rather than a vulnerability in HWP itself, recent reports suggest that all users of Hancom Office, from previous products to the latest versions, need to be more cautious when presented with a separate message window prompting them to click.

Particularly, the HWP attack methods and tactical commands used in this attack have been analyzed to match previous North Korean-linked cyberattack cases, indicating that a North Korean cyber threat organization is suspected to be behind these efforts. Mr. Moon Jong-hyun, the director of the ESRC center, stated, "Although spear phishing attacks based on malicious HWP documents have significantly decreased from before, they still represent an ignored threat that is consistently witnessed in covert targeted attacks. As North Korea-linked cyber threats continue to increase day by day, closer public-private coordination and cooperation are important," he urged.

Meanwhile, ESTsecurity's ESRC is closely sharing information related to these cyber threats with related authorities such as the Korea Internet & Security Agency (KISA) to maintain cooperation to prevent the spread of previously known threats.

WE WORK WITH AI

We believe that AI makes the world more convenient and safer

1.

Senior care with AI

AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

2.

Education with AI

Celebrity instructor video lecture creation, TOEIC speaking education content production, as a fitness training instructor

Expansion of educational businesses in various fields such as AI content

3.

Content with AI

Implementing 'moving pictures' with EST AI technology, 'face transformation, makeup application, and clothing creation' through deep learning

Creating and utilizing various AI human content such as new employee analysts, announcers, etc.

4.

API business with AI

Companies can focus on their inherent customer value by providing data and solutions using AI

as an API.

5.

Software with AI

Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,

provides the utility environment that users want.

WE WORK WITH AI

We believe that AI makes

the world more convenient

and safer

1.

Senior care with AI

AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

2.

Education with AI

Celebrity instructor video lecture creation, TOEIC speaking education content production, as a fitness training instructor

Expansion of educational businesses in various fields such as AI content

3.

Content with AI

Implementing 'moving pictures' with EST AI technology, 'face transformation, makeup application, and clothing creation' through deep learning

Creating and utilizing various AI human content such as new employee analysts, announcers, etc.

4.

API business with AI

We provide data and solutions utilizing AI through APIs to enable companies to focus on their inherent customer value.

5.

Software with AI

Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,

provides the utility environment that users want.

WE WORK WITH AI

We believe that AI makes the world more convenient and safer

1.

Senior care with AI

AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

2.

Education with AI

Celebrity instructor video lecture creation, TOEIC speaking education content production, as a fitness training instructor

Expansion of educational businesses in various fields such as AI content

3.

Content with AI

Implementing 'moving pictures' by applying EST AI technology, producing various AI human contents such as 'face transformation, makeup application, and clothing creation' for new employees including analysts and announcers, and utilizing them

4.

API business with AI

Companies can focus on their inherent customer value by providing data and solutions using AI

as an API.

5.

Software with AI

Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,

provides the utility environment that users want.

WE WORK WITH AI

We believe that AI makes the world more convenient and safer

1.

Senior care with AI

AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

2.

Education with AI

Expansion of educational businesses in various fields, such as the establishment of celebrity lecture video courses, production of TOEIC speaking educational content, and AI content as a fitness training instructor

3.

Content with AI

Implementing 'moving pictures' with EST AI technology, 'face transformation, makeup application, and clothing creation' through deep learning

Creating and utilizing various AI human content such as new employee analysts, announcers, etc.

4.

API business with AI

We provide data and solutions utilizing AI through APIs to enable companies to focus on their intrinsic customer value.

5.

Software with AI

Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,

provides the utility environment that users want.

LET'S Connect

We collaborate with ambitious brands and people around the world.

To learn more about creating digital experiences that effectively reach and engage customers and target audiences, please contact us.

Download Company Brochure

CEO: Sangwon Jung

Business Registration Number 229-81-03214 Mail-Order Business Notification Number 2011-Seoul Seocho-1962

EST Building, 3 Banpo-daero, Seocho-gu, Seoul (Postal Code)06711

Family Site

LET'S Connect

We collaborate with ambitious brands and people around the world.

To learn more about creating digital experiences that effectively reach and engage customers and target audiences, please contact us.

Download Company Brochure

CEO: Sangwon Jung

Business Registration Number 229-81-03214 Mail-Order Business Notification Number 2011-Seoul Seocho-1962

EST Building, 3 Banpo-daero, Seocho-gu, Seoul (Postal Code)06711

Family Site

LET'S Connect

We collaborate with ambitious brands and people around the world.

To learn more about creating digital experiences that effectively reach and engage customers and target audiences, please contact us.

Download Company Brochure

CEO: Sangwon Jung

Business Registration Number 229-81-03214 Mail-Order Business Notification Number 2011-Seoul Seocho-1962

EST Building, 3 Banpo-daero, Seocho-gu, Seoul (Postal Code)06711

Family Site

LET'S Connect

We collaborate with ambitious brands and people around the world.

To learn more about creating digital experiences that effectively reach and engage customers and target audiences, please contact us.

Download Company Brochure

CEO: Sangwon Jung

Business Registration Number 229-81-03214 Mail-Order Business Notification Number 2011-Seoul Seocho-1962

EST Building, 3 Banpo-daero, Seocho-gu, Seoul (Postal Code)06711

Family Site