Google: "North Korean hackers armed with AI, focusing attacks on South Korea's defense industry and semiconductors... government is not safe either"

"North Korean hacker groups are targeting South Korea's defense, semiconductor, and automobile industries. They are after important intellectual property and technical information, and the government cannot be safe from various threats."



Luke McNamara, deputy chief analyst at Google's Threat Intelligence Group, speaks during a media briefing for "Google Cloud Security Day" held at the Gangnam Finance Center in Seoul on the morning of the 19th. [Photo = Reporter Yoon So-jin]



Luke McNamara, deputy chief analyst at Google's Threat Intelligence Group, warned of the North Korean hacker group's expansion of attacks on major South Korean industries and the possibility of threats to government agencies during a media briefing for "Google Cloud Security Day" held at the Gangnam Finance Center in Seoul on the 19th. The analysis is that attacks by state-sponsored hacking groups are becoming more covert and their attack methods utilizing generative artificial intelligence (AI) are evolving, so companies and the government need to respond proactively.



North Korean hacker attack methods are evolving… According to analyst McNamara,



the industries that have been most attacked in Korea in the past two years are manufacturing, financial services, and media and entertainment. Among them, North Korean hacking groups such as APT45 and Lazarus are focusing their attacks on Korea's defense, semiconductor, and automobile industries.



Analyst McNamara warned, "In particular, the defense industry is currently receiving a lot of investment worldwide, making it a major target for hacking groups supported by countries such as North Korea." He added, "South Korean defense companies are also facing attacks targeting new technologies and potential buyer information."



In this process, North Korea is known to be using a new threat strategy called disguising IT personnel as employees. North Korean IT personnel are employed by companies in other countries and the profits are transferred to the North Korean government or internal information is stolen.



No such cases have been detected in Korea yet. However, they are mainly found in North America and are spreading globally to Southeast Asia, Europe, and Latin America.



Analyst McNamara explained, "North Korean IT workers are reluctant to participate in video conferences or request that their laptops be delivered to a different address than their resumes." He added, "They bypass background checks and open bank accounts through local brokers. After employment, they can be threatened with data leaks or even be fired."



Stealing credentials through phishing... Increased attack efficiency with generative AI



Another characteristic of North Korean hacking groups is that they are using generative AI to increase attack efficiency. Analyst McNamara explained, "Hacking groups in China, Iran, and North Korea are using generative AI to enhance the entire attack process, including reconnaissance, vulnerability research, and malware development."



What is concerning is the possibility that these attacks could expand to government agencies. Analyst McNamara said, "Governments are always a major target of various threat actors. North Korea's APT 45 group targets policymakers in South Korea, Japan, and the United States and is looking for political information."



Basic security enhancement is essential to respond to these attacks. Analyst McNamara emphasized the importance of introducing strong multi-factor authentication (MFA) and regular credential replacement for security in cloud environments.



Credential theft refers to an act in which a cyber attacker steals the login information (ID and password) of a legitimate user. In the fourth quarter of last year, 43% of the cloud breach incidents responded to by Google Cloud Mandiant were caused by credential theft (ID and password) through phishing.



Analyst McNamara urged companies to strengthen their security awareness, saying, "There was a case in which the stolen credentials two years ago did not have MFA and were not replaced, so the attackers were able to log in again."





https://www.inews24.com/view/blogger/1824920

Comments

Popular posts from this blog

Livestock Manure Methane Is Soaring, But ‘Resource Recovery’ Isn’t Working [Now is a Climate Crisis]

KT-MS, 'Super Cooperation' to Improve Korea's AI Capabilities... "Providing AI Education to All Citizens" (Comprehensive)

"TSMC to have 2nm line with monthly production capacity of 50,000 sheets by year-end"