Security News > 2021 > March > North Korean .Gov Hackers Back With Fake Pen-Test Company
A North Korean government-backed APT group has been caught using a fake pen-testing company and a range of sock puppet social media accounts in an escalation of a hacking campaign targeting security research professionals.
The notorious hacking group, first exposed by Google earlier this year, returned on March 17th with a website for a fake penetration testing company.
"The new website claims the company is an offensive security company located in Turkey that offers pentests, software security assessments and exploits," according to Adam Weidemann, a researcher in Google's TAG. Like previous websites used by this actor, Google said the new website even has a link to a PGP public key at the bottom of the page that was connected to the earlier January attacks.
In addition to the fake "SecuriElite" security assessment company, the campaign also included a batch of carefully crafted social media profiles used to lend credibility to the fake outfit.
The attacker's latest batch of social media profiles continue the trend of posing as fellow security researchers interested in exploitation and offensive security.
Google released data on multiple fake Twitter handles, sock puppet LinkedIn profiles, and attacker-controlled websites belonging to the North Korean APT group.
News URL
Related news
- North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks (source)
- North Korean govt hackers linked to Play ransomware attack (source)
- North Korean hackers pave the way for Play ransomware (source)
- North Korean hackers employ new tactics to compromise crypto-related businesses (source)
- North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS (source)
- North Korean hackers use new macOS malware against crypto firms (source)
- North Korean Hackers Target macOS Using Flutter-Embedded Malware (source)
- North Korean hackers create Flutter apps to bypass macOS security (source)