Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

US Cyber Command published malware reportedly of North Korean hackers

 

U.S. Cyber Command, which operates alongside National Security Agency, recently posted some fresh malware samples and claimed they were of hackers from North Korea. NSA deals with hacking crimes as well as dangerous security operations. The U.S. military division posted a tweet on August 14 declaring its uploading of the malicious software onto VirusTotal one popular database that aids in security as well as malware research.

 

Uploading malicious software onto the server isn't new for the military unit, which runs a Twitter account of its own where it tells followers the names of malicious programs it uploads from time to time.

 

While the uploading aids teams of security professionals combat online threats that countries unleash, it as well provides a not so frequent insight into hacking groups receiving state sponsorship that Cyber Command in particular focuses on. The United States government has named the uploaded malicious programs ElectricFish. ElectricFish is one kind of tool that exfiltrates data between computers after the implantation of a backdoor.

 

According to Brian Bartholomew Principal Senior Security Researcher at Kaspersky in an interview to CyberScoop, the Electric Fish executable seems as the same malicious program which the Department of Homeland Security along with FBI cautioned industry of during May.

 

Bartholomew says among the samples, one as said is seemingly ElectricFish a widely-used tunneling tool of North Korean hackers while another is a confirmed phony TLS proxy program. The program lets a hacker make one hop point of the victim for tunneling traffic in a likewise manner of ElectricFish. www.cyberscoop.com posted this, August 15, 2019.

 

Another North Korean-sponsored hackers' syndicate APT38, according to Cyber-Security Firm FireEye, has quite separate objectives from the rest for e.g. Lazarus that allegedly hacked Sony Enterprises during 2016 and also ran WannaCry ransomware attacks the following year. With objective of committing financial crimes, APT38 stole massive sums of USDs from banking institutions all over the globe. Lazarus typically runs hacking operations that serves Pyongyang's interests.

 

Of late, a report exposed from United Nations reveals that North Korea rulers had stolen over USD2bn via many cyber-assaults for financing its different armory programs.

 

» SPAMfighter News - 30-08-2019

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next