Skip to content

Shocking Cybersecurity Techniques used by North Korean Scammers to Target U.S Based Businesses and available Mitigation Methods

istockphoto-1384202592-612x612

North Korean cyber crime activities have been known to target various sectors of the United States, these sectors includes financial institutions, Automobile dealers, Healthcare providers and other businesses. Their tactics have been dynamic, their cyber program pose a calculated and agile espionage attempt on U.S based businesses and critical infrastructure sector entities.  This articles sheds light on common strategies used to breach U.S based business and available mitigation method as recommended by  the Cybersecurity & Infrastructure Security Agency.

PHISHING ATTACKS

North Korean cyber threat actors use deceptive email that appear legitimate to deceive employees into providing sensitive information or clicking a malicious link. These emails may appear to be from legitimate sources such as a trusted vendor, banks or government agencies. They also use Spear Phishing technique which is a customized phishing email that target specific individuals within an organization.often with information gathered from social media or other sources to increase the appearance of legitimacy.

SOCIAL ENGINEERING

North Korean scammers may use social engineering techniques like pretexting, tailgating and other forms of social engineering attacks to manipulate individuals and C-suite executive into revealing confidential information. This can involve building a relationship of trust or exploiting psychological vulnerabilities. Fake job offers is also a form of social engineering attack. Posting fake job listings or reaching out to individuals with false job offers to extract personal information or initiate scams. 

MALWARE DISTRIBUTION

Malicious software payload can be used to compromise computer systems and steal sensitive information. North Korean scammers usually make use of infected attachments or using malware ingested websites. North Korean scammers use various techniques including email links, to distribute malware. This malicious software can take many forms such as ransomware, spyware, or Trojan. Once activated, these programs can compromise systems, steal sensitive data, or provide unauthorized access to attackers.

CRYPTOJACKING

North Korean hackers might infiltrate an organization network to deploy cryptocurrency mining scripts without authorization. This process consumes computing resources, slowing down systems and increasing operational costs for the targeted business.

BUSINESS EMAIL COMPROMISE (BEC)

BEC involves impersonating C-suite executives or employees within an organization to deceive employees into transferring funds or providing sensitive information. This often occurs through email requests that appear legitimate instructing employees to take urgent actions like wire transfer. Most times bank coordinates are replaced and funds belonging to the organization is sent to the attackers account. 

RANSOMWARE ATTACKS

North Korean cyber criminals deploy ransomware through various means encrypting a company's data and demanding payments, usually in cryptocurrency, in exchange for decryption keys. This type of attack can disrupt business operations and cause significant financial losses and reputational damage. Whist not unique to any specific region, ransomware attacks involve encrypting a victim's data and demanding payment for its release.North Korea has been linked to the WannaCry ransomware attack, among others to attack U.S based businesses. 

SUPPLY CHAIN ATTACKS

North Korean threat actor usually target third-party supplier or vendors connected to an organization's network to gain access to their systems. Once compromised, the attackers exploit these connections to infiltrate the primary target, causing potential data breaches or system compromises. 

CREDENTIAL THEFT

North Korean threat actors employ various methods to steal login credentials, including using keyloggers, phishing attacks, or exploiting vulnerabilities in software to gain unauthorized access to a company's system and sensitive information. 

DDoS ATTACKS

Distributed Denial of Service attacks overwhelm an organizations servers or network resources with a flood of incoming traffic, rendering systems inaccessible. North Korean cyber criminals may use DDoS attack to disrupt services, causing financial losses and damaging an organization's reputation.

CREATING FAKE WEBSITE

North Korean Scammers might create counterfeit websites resembling legitimate businesses, banks or government agencies. These websites are designed to deceive users into entering personal or financial information, which is then captured by the attackers for fraudulent purposes. 

IMPERSONATING GOVERNMENT AGENCIES

North Korean Scammers pose as legitimate representatives from government agencies or regulatory bodies, sending intimidating messages to  coerce businesses into providing sensitive information or making payments under the false pretence of compliance or legal action.

FAKE INVESTMENT OF FINANCIAL OPPORTUNITIES

There has been instances where North Korean scammers promote fraudulent investment schemes promising high returns or exclusive financial opportunities. These schemes aim to entice businesses into investing money or sharing sensitive financial information, leading to financial losses or identity theft. 

FAKE INVOICES OR PAYMENT REQUEST

North Korean Scammers might send fraudulent invoices or payment requests appearing to be from legitimate vendors, contractors or authorities. These requests often contain altered bank account details, aiming to trick employees into transferring funds to the scammer's accounts. 

AVAILABLE MITIGATION METHODS RECOMMENDED BY CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY  ( CISA) 

To strengthen operational resilience against this threat, CISA advises organizations to implement the actionable mitigations that CISA and our partners in the U.S. government and around the world release. As a starting point, organizations should:

This articles was written with support of content from Cybersecurity & Infrastructure Security Agency ( America's Cybersecurity Defense Agency). The North Korea Cyber Threat Overview and Advisories can be found here ( https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/north-korea#:~:text=Description%20CISA%20and%20FBI%20have,and%20to%20further%20network%20exploitation.)