Researching North Korea online? You could be victim of a malware attack

People with an interest in all things North Korea are being targeted with a very specific malware.

Cybersecurity researchers from Trend Micro (via BleepingComputer) have recently observed Earth Kitsune, a nascent threat actor, breaching a pro-North Korea website, and then using that site to deliver a backdoor dubbed WhiskerSpy.

The malware allows the threat actors to steal files, take screenshots, and deploy additional malware to the compromised endpoint.

WhisperSpy malware

According to the researchers, when certain people visit the website and look to run video content, they’ll be prompted to install a video codec first. Those that fall for the trick would download a modified version of a legitimate codec (Codec-AVC1.msi), which installs the WhiskerSpy backdoor.

The backdoor grants the threat actors a number of different capabilities, including downloading files to the compromised endpoint, uploading files, deleting them, listing them, taking screenshots, loading executables and calling its export, and injecting shellcode into processes.

The backdoor then communicates with the malware’s command and control (C2) server, using a 16-byte AES encryption key.

But not all visitors are at risk. In fact, chances are that only a small portion of the visitors are being targeted, as Trend Micro discovered that the backdoor only activates when visitors from Shenyang, China, or Nagoya, Japan, open the site. 

Truth be told, people from Brazil would also be prompted to download the backdoor, but researchers believe Brazil was only used to test if the attack works or not. 

After all, the researchers found the IP addresses in Brazil belonged to a commercial VPN service.

Once installed, the malware goes to lengths to persist on the device. Apparently, Earth Kitsune uses the native messaging host in Google’s Chrome browser to install a malicious extension called Google Chrome Helper. This extension would run the payload every time the browser starts.

Go to Source