Security News
North Korean hackers have been exploiting a zero-day in Chrome. The flaw, tracked as CVE-2022-0609, was exploited by two separate North Korean hacking groups.
Google on Thursday described how it apparently caught and thwarted North Korea's efforts to exploit a remote code execution vulnerability in Chrome. Exploiting the bug clears the way to compromise a victim's browser and potentially take over their computer to spy on them.
Thieves operating for the North Korean government made off with almost $400m in digicash last year in a concerted attack to steal and launder as much currency as they could. Bitcoin used to be a top target but Ether is now the most stolen currency, say the researchers, accounting for 58 per cent of the funds filched.
An ongoing malware distribution campaign targeting South Korea is disguising RATs as an adult game shared via webhards and torrents. The attackers are using easily obtainable malware such as njRAT and UDP RAT, wrap them in a package that appears like a game or other program, and then upload them on webhards.
A US citizen has admitted to helping the Democratic People's Republic of Korea to establish cryptocurrency capabilities and faces up to 20 years jail for his actions. The DoJ alleges Griffith and his co-conspirators "Provided instruction on how the DPRK could use blockchain and cryptocurrency technology to launder money and evade sanctions," and "How blockchain technology such as 'smart contracts' could be used to benefit the DPRK, including in nuclear weapons negotiations with the United States."
A US citizen has admitted to helping the Democratic People's Republic of Korea to establish cryptocurrency capabilities and faces up to 20 years jail for his actions. The Department of Justice on Monday revealed that Virgil Griffith, a US citizen resident in Singapore, hatched plans in 2018 to help an individual in the hermit kingdom mine cryptocurrency.
Griffith, who worked as a special projects dev and researcher for the Ethereum Foundation, was arrested in November 2019 by the FBI. Advice on how to evade sanctions and launder money. His arrest happened after he traveled to North Korea to give a presentation on how to use cryptocurrency and blockchain tech to launder money and evade sanctions.
Another alleged member of the TrickBot gang has been apprehended, this time when trying to leave South Korea, according to published reports.His arrest was the result of an investigation U.S. authorities began into TrickBot during his time in South Korea after the botnet was used "To facilitate ransomware attacks across the US throughout 2020," according to the report.
An alleged Russian developer for the notorious TrickBot malware gang was arrested in South Korea after attempting to leave the country. The TrickBot cybercrime group is responsible for a variety of sophisticated malware targeting Windows and Linux devices to gain access to victim's networks, steal data, and deploy other malware, such as ransomware.
South Korea has this week announced two new weapons: grenade-launching drones for its military, and anti-ransomware software for businesses. The nation's Defense Acquisition Program Administration has revealed that in 2022 South Korea will test grenade-launching drones that can be remotely controlled over a range of two kilometres, carrying gunpowder-filled 40mm shells.