Kimsuky Hackers Linked to Credential Theft Using Russian Email Addresses

December 3, 2024
Threat Intelligence / Email Security

The North Korea-aligned threat group Kimsuky has been implicated in a series of phishing attacks utilizing email addresses that appear to originate from Russia, aimed at stealing user credentials. According to South Korean cybersecurity firm Genians, these phishing emails were predominantly sent from services in Japan and Korea until early September. However, starting in mid-September, a shift was noted with some emails crafted to look as if they were sent from Russia. This involves the exploitation of VK’s Mail.ru email service, which includes multiple alias domains such as mail.ru, internet.ru, bk.ru, inbox.ru, and list.ru. Genians has reported that Kimsuky has used these domains in phishing campaigns that impersonate financial institutions and popular internet sites like Naver. Additionally, some attacks have involved spoofing Naver’s MYBOX cloud storage service to deceive users into providing sensitive information.

Kimsuky Hackers Leverage Russian Email Domains in Credential Theft Operations

December 3, 2024
Threat Intelligence / Email Security

Recent investigations have revealed that Kimsuky, a North Korea-affiliated hacking group, has shifted its phishing tactics, now utilizing email addresses registered in Russia to facilitate credential theft. This intelligence, reported by South Korean cybersecurity firm Genians, highlights a notable change in the group’s modus operandi, reflecting their adaptive strategies in targeting vulnerable organizations.

Historically, the Kimsuky group relied on email addresses from services based in Japan and Korea for their phishing campaigns. However, Genians reported that starting in mid-September, a marked evolution in their approach was detected. The actors began sending out phishing emails that appeared to originate from Russian domains. Notably, these campaigns exploited VK’s Mail.ru service, which operates multiple alias domains, including mail.ru, internet.ru, bk.ru, inbox.ru, and list.ru.

Genians has tracked the use of these domains across phishing initiatives that often imitate reputable financial institutions and popular internet platforms, particularly Naver, a leading South Korean portal. These impersonations aim to deceive users into divulging sensitive information. In addition, some phishing efforts have centered on mimicking Naver’s MYBOX cloud storage service, further broadening the group’s tactics to exploit user trust in these established services.

The primary targets of these operations appear to be individuals and organizations situated in South Korea, where Naver holds significant influence and user engagement. The deliberate choice of using Russian email addresses may suggest an effort to obfuscate the attackers’ true origin, complicating detection and response efforts by security teams.

From a tactical perspective, the Kimsuky group’s actions align with several techniques outlined in the MITRE ATT&CK framework. The initial access tactic is evident as they employ phishing emails to infiltrate targets, often leading to credential harvesting. The persistence of these attacks can be attributed to the continuous evolution of their email strategies, maintaining a consistent presence in the threat landscape. Moreover, their use of well-known and trusted platforms may indicate a focus on privilege escalation, aiming to gain access to additional accounts or sensitive data once the initial compromise occurs.

As businesses continue to navigate these cybersecurity challenges, understanding the ever-evolving tactics of threat actors like Kimsuky becomes crucial. Organizations must implement robust email security measures and remain vigilant against phishing attempts, especially those that mimic communications from trusted services.

Source link