Security News > 2022 > January > North Korean Hackers Return with Stealthier Variant of KONNI RAT Malware

A cyberespionage group with ties to North Korea has resurfaced with a stealthier variant of its remote access trojan called Konni to attack political institutions located in Russia and South Korea.
"The authors are constantly making code improvements," Malwarebytes researcher Roberto Santos said.
"Their efforts are aimed at breaking the typical flow recorded by sandboxes and making detection harder, especially via regular signatures as critical parts of the executable are now encrypted."
Most recent intrusions staged by the group, believed to be operating under the Kimsuky umbrella, involved targeting the Russian Federation's Ministry of Foreign Affairs with New Year lures to compromise Windows systems with malware.
The infections, as with other attacks of this kind, starts with a malicious Microsoft Office document that, when opened, initiates a mult-stage process that involves several moving parts that help the attackers elevate privileges, evade detection, and ultimately deploy the Konni RAT payload on compromised systems.
On top of that, the various support files dropped to facilitate the compromise are also now encrypted using AES. "Cleverly, they reused the algorithm used for string protection, making the file layout identical to the protected strings layout, as they appear in raw memory," Santox detailed.
News URL
https://thehackernews.com/2022/01/north-korean-hackers-return-with.html
Related news
- North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages (source)
- Chinese hackers target Russian govt with upgraded RAT malware (source)
- North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures (source)
- North Korean hackers adopt ClickFix attacks to target crypto firms (source)
- We Smell a (DC)Rat: Revealing a Sophisticated Malware Delivery Chain (source)
- North Korean Hackers Disguised as IT Workers Targeting UK, European Companies, Google Finds (source)
- Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT (source)
- Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool (source)
- State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns (source)
- Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery (source)