Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on October 27, 2020, 06:12:14 PM

Title: US-CERT- AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky
Post by: Netwörkheäd on October 27, 2020, 06:12:14 PM
AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

[html]Original release date: October 27, 2020

Summary

This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques.



This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Cyber Command Cyber National Mission Force (CNMF). This advisory describes the tactics, techniques, and procedures (TTPs) used by North Korean advanced persistent threat (APT) group Kimsuky—against worldwide targets—to gain intelligence on various topics of interest to the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https://www.us-cert.cisa.gov/northkorea.



This advisory describes known Kimsuky TTPs, as found in open-source and intelligence reporting through July 2020. The target audience for this advisory is commercial sector businesses desiring to protect their networks from North Korean APT activity.



Click here for a PDF version of this report.



Key Findings



This advisory's key findings are:




Technical Details

Initial Access



Kimsuky uses various spearphishing and social engineering methods to obtain Initial Access [TA0001] to victim networks.[9],[10],[11] Spearphishing—with a malicious attachment embedded in the email—is the most observed Kimsuky tactic (Phishing: Spearphishing Attachment [T1566.001]).[12],[13]





Kimsuky's other methods for obtaining initial access include login-security-alert-themed phishing emails, watering hole attacks, distributing malware through torrent sharing sites, and directing victims to install malicious browser extensions (Phishing: Spearphising Link [T1566.002], Drive-by Compromise [T1189], Man-in-the-Browser [T1185]).[18]



Execution



After obtaining initial access, Kimsuky uses BabyShark malware and PowerShell or the Windows Command Shell for Execution [TA0002].





Persistence



Kimsuky has demonstrated the ability to establish Persistence [TA0003] through using malicious browser extensions, modifying system processes, manipulating the autostart execution, using Remote Desktop Protocol (RDP), and changing the default file association for an application. By using these methods, Kimsuky can gain login and password information and/or launch malware outside of some application allowlisting solutions.





Privilege Escalation



Kimsuky uses well-known methods for Privilege Escalation [TA0004]. These methods include placing scripts in the Startup folder, creating and running new services, changing default file associations, and injecting malicious code in explorer.exe.







Figure 1: Privileges set for the injection [37]



Defense Evasion



Kimsuky uses well-known and widely available methods for Defense Evasion [TA0005] within a network. These methods include disabling security tools, deleting files, and using Metasploit.[38],[39]





Machine generated alternative text:<br />1 <br />2 <br />3 <br />4 <br />5 <br />6 <br />7 <br />8 <br />9 <br />lø <br />SYSTEMCurrentControlSetServicesSharedAccessParameters <br />Fi rewal i cyStandardProfi le <br />SYSTEMCurrentControlSetServicesSharedAccessParameters <br />Fi rewal icyPublicProfile <br />HKLMSOFTWAREAhnLabV31S2ØØ71nternetSec <br />FWRunMode ø <br />HKLMSOFTWAREAhn1abV31S8Øis <br />fwmode ø Text only | Text with Images