ESTsecurity, Domestic portal company's cloud service impersonation attack… Hacking by North Korea follows in succession

ESTsecurity, Domestic portal company's cloud service impersonation attack… Hacking by North Korea follows in succession

ESTsecurity, Domestic portal company's cloud service impersonation attack… Hacking by North Korea follows in succession

ESTsecurity, Domestic portal company's cloud service impersonation attack… Hacking by North Korea follows in succession

broad

2022. 8. 8.

22. 8. 8.

An attempt at a sophisticated hacking attack posing as an invitation to share data from the actual cloud service of the portal company

An attempt at a sophisticated hacking attack posing as an invitation to share data from the actual cloud service of the portal company

An attempt at a sophisticated hacking attack posing as an invitation to share data from the actual cloud service of the portal company

An attempt at a sophisticated hacking attack posing as an invitation to share data from the actual cloud service of the portal company

ESTsecurity, Domestic portal company's cloud service impersonation attack… Hacking by North Korea follows in succession
ESTsecurity, Domestic portal company's cloud service impersonation attack… Hacking by North Korea follows in succession

Integrated security company ESTsecurity (CEO Jeong Jin-il) warned with special attention on the 8th, as it has recently detected hacking attacks linked to the North that are disguised as the contents of the cloud sharing invitation service of a domestic portal company.

The recent attack cleverly impersonated a popular service with many users in Korea and primarily targeted experts and journalists working in the field of North Korea to conduct phishing attacks.

The attack conducted last Saturday deceived as if it had shared a file on 'The History of North Korea's Nuclear Development and Prospects for the Development of North Korea-US Relations', and was characterized by delivering it in the name of a person who had served as the first director of overseas and North Korean affairs at the National Intelligence Service during a past government.

In the body of the hacking attack email, to induce the recipient to click the invite acceptance button, it even included an invitation message that read, 'We send you one case on the strategic direction of North Korea's 8th party congress and the prospect of changes in the policy towards the South.' This content manipulation helped the recipient to trust it more.

As a result of the analysis by ESTsecurity's Security Response Center (known as ESRC), it was revealed that clicking on the [Accept] button in the email body would connect to phishing servers such as ‘share.myboxes.navers[.]tech’, ‘view.boxfile[.]click’, attempting to steal the user's password.

Although the attackers did not directly use the cloud service sharing invitation feature of the portal, the body of the hacking email almost identically mimicked the design and phrases of the actual service, making it likely that recipients with prior experience receiving such shares would be exposed to hacking threats without suspicion.

ESRC, which has been analyzing such attack methods for several months, explained that the attack was ultimately identified as the act of a North Korean Reconnaissance General Bureau-linked hacking organization classified as 'KGH', as it is a continuation of the 'Semitz NFT Reward Impersonation Hacking' incident known for the purpose of foreign currency earning last July and the 'Hacking attack disguised as issuing a health examination result certificate' that has been continuously discovered since earlier this year.

Meanwhile, the cyber security threat organization identified behind this attack had also participated in attacks last July that impersonated notification emails of a smart credit service provided by a specific domestic credit card company and a financial information protection service, alerting customers via SMS and email if identity verification occurs in the customer's name.

At that time, the attack was a phishing type that impersonated the service and lured to click the [Verify Identity Verification History] button, connecting to the ‘hanacard.navceo[.]website’ phishing server and attempted to steal the recipient's email password.

Attackers are persistently attacking North Korea-related personnel in Korea until hacking is successful, utilizing various themes, and are actively employing attacks not only through URL phishing that simply induces clicking, but also using malicious documents such as DOC and HWP files.

An ESTsecurity ESRC official noted, 'As the ROK-US joint military exercise begins on the 22nd, the cyber offensive, pointed to North Korea, is intensifying,' and urged, 'Especially since we are exposed to email hacking attacks disguised as everyday content, both individuals and companies should heighten their attention and vigilance on cyber security, remove blind spots and insensitivity, and make full preparations for security.'

ESTsecurity is closely cooperating with related departments such as the Korea Internet & Security Agency (KISA) to respond to the prevention of similar damage spread.

Integrated security company ESTsecurity (CEO Jeong Jin-il) warned with special attention on the 8th, as it has recently detected hacking attacks linked to the North that are disguised as the contents of the cloud sharing invitation service of a domestic portal company.

The recent attack cleverly impersonated a popular service with many users in Korea and primarily targeted experts and journalists working in the field of North Korea to conduct phishing attacks.

The attack conducted last Saturday deceived as if it had shared a file on 'The History of North Korea's Nuclear Development and Prospects for the Development of North Korea-US Relations', and was characterized by delivering it in the name of a person who had served as the first director of overseas and North Korean affairs at the National Intelligence Service during a past government.

In the body of the hacking attack email, to induce the recipient to click the invite acceptance button, it even included an invitation message that read, 'We send you one case on the strategic direction of North Korea's 8th party congress and the prospect of changes in the policy towards the South.' This content manipulation helped the recipient to trust it more.

As a result of the analysis by ESTsecurity's Security Response Center (known as ESRC), it was revealed that clicking on the [Accept] button in the email body would connect to phishing servers such as ‘share.myboxes.navers[.]tech’, ‘view.boxfile[.]click’, attempting to steal the user's password.

Although the attackers did not directly use the cloud service sharing invitation feature of the portal, the body of the hacking email almost identically mimicked the design and phrases of the actual service, making it likely that recipients with prior experience receiving such shares would be exposed to hacking threats without suspicion.

ESRC, which has been analyzing such attack methods for several months, explained that the attack was ultimately identified as the act of a North Korean Reconnaissance General Bureau-linked hacking organization classified as 'KGH', as it is a continuation of the 'Semitz NFT Reward Impersonation Hacking' incident known for the purpose of foreign currency earning last July and the 'Hacking attack disguised as issuing a health examination result certificate' that has been continuously discovered since earlier this year.

Meanwhile, the cyber security threat organization identified behind this attack had also participated in attacks last July that impersonated notification emails of a smart credit service provided by a specific domestic credit card company and a financial information protection service, alerting customers via SMS and email if identity verification occurs in the customer's name.

At that time, the attack was a phishing type that impersonated the service and lured to click the [Verify Identity Verification History] button, connecting to the ‘hanacard.navceo[.]website’ phishing server and attempted to steal the recipient's email password.

Attackers are persistently attacking North Korea-related personnel in Korea until hacking is successful, utilizing various themes, and are actively employing attacks not only through URL phishing that simply induces clicking, but also using malicious documents such as DOC and HWP files.

An ESTsecurity ESRC official noted, 'As the ROK-US joint military exercise begins on the 22nd, the cyber offensive, pointed to North Korea, is intensifying,' and urged, 'Especially since we are exposed to email hacking attacks disguised as everyday content, both individuals and companies should heighten their attention and vigilance on cyber security, remove blind spots and insensitivity, and make full preparations for security.'

ESTsecurity is closely cooperating with related departments such as the Korea Internet & Security Agency (KISA) to respond to the prevention of similar damage spread.

Integrated security company ESTsecurity (CEO Jeong Jin-il) warned with special attention on the 8th, as it has recently detected hacking attacks linked to the North that are disguised as the contents of the cloud sharing invitation service of a domestic portal company.

The recent attack cleverly impersonated a popular service with many users in Korea and primarily targeted experts and journalists working in the field of North Korea to conduct phishing attacks.

The attack conducted last Saturday deceived as if it had shared a file on 'The History of North Korea's Nuclear Development and Prospects for the Development of North Korea-US Relations', and was characterized by delivering it in the name of a person who had served as the first director of overseas and North Korean affairs at the National Intelligence Service during a past government.

In the body of the hacking attack email, to induce the recipient to click the invite acceptance button, it even included an invitation message that read, 'We send you one case on the strategic direction of North Korea's 8th party congress and the prospect of changes in the policy towards the South.' This content manipulation helped the recipient to trust it more.

As a result of the analysis by ESTsecurity's Security Response Center (known as ESRC), it was revealed that clicking on the [Accept] button in the email body would connect to phishing servers such as ‘share.myboxes.navers[.]tech’, ‘view.boxfile[.]click’, attempting to steal the user's password.

Although the attackers did not directly use the cloud service sharing invitation feature of the portal, the body of the hacking email almost identically mimicked the design and phrases of the actual service, making it likely that recipients with prior experience receiving such shares would be exposed to hacking threats without suspicion.

ESRC, which has been analyzing such attack methods for several months, explained that the attack was ultimately identified as the act of a North Korean Reconnaissance General Bureau-linked hacking organization classified as 'KGH', as it is a continuation of the 'Semitz NFT Reward Impersonation Hacking' incident known for the purpose of foreign currency earning last July and the 'Hacking attack disguised as issuing a health examination result certificate' that has been continuously discovered since earlier this year.

Meanwhile, the cyber security threat organization identified behind this attack had also participated in attacks last July that impersonated notification emails of a smart credit service provided by a specific domestic credit card company and a financial information protection service, alerting customers via SMS and email if identity verification occurs in the customer's name.

At that time, the attack was a phishing type that impersonated the service and lured to click the [Verify Identity Verification History] button, connecting to the ‘hanacard.navceo[.]website’ phishing server and attempted to steal the recipient's email password.

Attackers are persistently attacking North Korea-related personnel in Korea until hacking is successful, utilizing various themes, and are actively employing attacks not only through URL phishing that simply induces clicking, but also using malicious documents such as DOC and HWP files.

An ESTsecurity ESRC official noted, 'As the ROK-US joint military exercise begins on the 22nd, the cyber offensive, pointed to North Korea, is intensifying,' and urged, 'Especially since we are exposed to email hacking attacks disguised as everyday content, both individuals and companies should heighten their attention and vigilance on cyber security, remove blind spots and insensitivity, and make full preparations for security.'

ESTsecurity is closely cooperating with related departments such as the Korea Internet & Security Agency (KISA) to respond to the prevention of similar damage spread.

WE WORK WITH AI

We believe that AI makes the world more convenient and safer

1.

Senior care with AI

AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

2.

Education with AI

Celebrity instructor video lecture creation, TOEIC speaking education content production, as a fitness training instructor

Expansion of educational businesses in various fields such as AI content

3.

Content with AI

Implementing 'moving pictures' with EST AI technology, 'face transformation, makeup application, and clothing creation' through deep learning

Creating and utilizing various AI human content such as new employee analysts, announcers, etc.

4.

API business with AI

Companies can focus on their inherent customer value by providing data and solutions using AI

as an API.

5.

Software with AI

Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,

provides the utility environment that users want.

WE WORK WITH AI

We believe that AI makes

the world more convenient

and safer

1.

Senior care with AI

AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

2.

Education with AI

Celebrity instructor video lecture creation, TOEIC speaking education content production, as a fitness training instructor

Expansion of educational businesses in various fields such as AI content

3.

Content with AI

Implementing 'moving pictures' with EST AI technology, 'face transformation, makeup application, and clothing creation' through deep learning

Creating and utilizing various AI human content such as new employee analysts, announcers, etc.

4.

API business with AI

We provide data and solutions utilizing AI through APIs to enable companies to focus on their inherent customer value.

5.

Software with AI

Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,

provides the utility environment that users want.

WE WORK WITH AI

We believe that AI makes the world more convenient and safer

1.

Senior care with AI

AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

2.

Education with AI

Celebrity instructor video lecture creation, TOEIC speaking education content production, as a fitness training instructor

Expansion of educational businesses in various fields such as AI content

3.

Content with AI

Implementing 'moving pictures' by applying EST AI technology, producing various AI human contents such as 'face transformation, makeup application, and clothing creation' for new employees including analysts and announcers, and utilizing them

4.

API business with AI

Companies can focus on their inherent customer value by providing data and solutions using AI

as an API.

5.

Software with AI

Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,

provides the utility environment that users want.

WE WORK WITH AI

We believe that AI makes the world more convenient and safer

1.

Senior care with AI

AI senior care service that takes responsibility for seniors' Fun and cognitive enhancement with AI human technology

2.

Education with AI

Expansion of educational businesses in various fields, such as the establishment of celebrity lecture video courses, production of TOEIC speaking educational content, and AI content as a fitness training instructor

3.

Content with AI

Implementing 'moving pictures' with EST AI technology, 'face transformation, makeup application, and clothing creation' through deep learning

Creating and utilizing various AI human content such as new employee analysts, announcers, etc.

4.

API business with AI

We provide data and solutions utilizing AI through APIs to enable companies to focus on their intrinsic customer value.

5.

Software with AI

Background removal technology applied in ALSee Capture, like the smooth design of ESTsoft AI technology and ALTools products,

provides the utility environment that users want.

LET'S Connect

We collaborate with ambitious brands and people around the world.

To learn more about creating digital experiences that effectively reach and engage customers and target audiences, please contact us.

Download Company Brochure

CEO: Sangwon Jung

Business Registration Number 229-81-03214 Mail-Order Business Notification Number 2011-Seoul Seocho-1962

EST Building, 3 Banpo-daero, Seocho-gu, Seoul (Postal Code)06711

Family Site

LET'S Connect

We collaborate with ambitious brands and people around the world.

To learn more about creating digital experiences that effectively reach and engage customers and target audiences, please contact us.

Download Company Brochure

CEO: Sangwon Jung

Business Registration Number 229-81-03214 Mail-Order Business Notification Number 2011-Seoul Seocho-1962

EST Building, 3 Banpo-daero, Seocho-gu, Seoul (Postal Code)06711

Family Site

LET'S Connect

We collaborate with ambitious brands and people around the world.

To learn more about creating digital experiences that effectively reach and engage customers and target audiences, please contact us.

Download Company Brochure

CEO: Sangwon Jung

Business Registration Number 229-81-03214 Mail-Order Business Notification Number 2011-Seoul Seocho-1962

EST Building, 3 Banpo-daero, Seocho-gu, Seoul (Postal Code)06711

Family Site

LET'S Connect

We collaborate with ambitious brands and people around the world.

To learn more about creating digital experiences that effectively reach and engage customers and target audiences, please contact us.

Download Company Brochure

CEO: Sangwon Jung

Business Registration Number 229-81-03214 Mail-Order Business Notification Number 2011-Seoul Seocho-1962

EST Building, 3 Banpo-daero, Seocho-gu, Seoul (Postal Code)06711

Family Site