Story image

North Korean criminals behind phishing attack on US power companies

12 Oct 17

Cybercriminals connected to The North Korean Government are suspected to be behind a spear phishing campaign that targeted numerous US power companies, as part of an early-stage reconnaissance mission.

Security firm FireEye detected and stopped the phishing emails last month and the company suspects that the attacks were not necessarily indicative of an imminent cyber attack.

“We have previously detected groups we suspect are affiliated with the North Korean government compromising electric utilities in South Korea, but these compromises did not lead to a disruption of the power supply,” FireEye’s Threat Research Blog says.

While hackers with links to North Korea make up some of the most ‘prolific’ nation-state threats according to FireEye, in this case threat actors have not been spotted using anything that could compromise industrial control system networks, which regulate power supplies, and there is no evidence the threat actors have the means to do so.

However, even small attacks against power companies would be seen as a victory by Pyongyang, FireEye speculates.

North Korean-linked threat actors often target South Korea and the United States, as well as the global financial systems and other nations.

FireEye says that nation-states often use cyberespionage campaigns as a way of getting intelligence. The company has detected 20 cyber threat groups sponsored by at least four other nation states that have been targeting the energy sector.

“The few examples of disruptions to energy sector operations being caused by cyber operations required additional technical and operational steps that these North Korean actors do not appear to have taken nor have shown the ability to take,” the company says.

In December 2014, North Korean threat actors may have been behind a campaign that targeted nuclear power plants in South Korea. The campaign used wiper malware not to disable operations, but to show their power and to embarrass the South Korean Government.

FireEye says threat actors’ motivations range from espionage, sabotage and economic gain – all of which demonstrate a nation-state that is willing to violate international norms.

“Thus far, the suspected North Korean actions are consistent with a desire to demonstrate a deterrent capability rather than a prelude to an unprovoked first-strike in cyberspace; however, North Korea linked actors are bold, have launched multiple cyber attacks designed to demonstrate national strength and resolve, and have little concern for potential discovery and attribution of their operations,” FireEye explains.

FireEye suspects these attackers will remain committed to going after energy sector targets, particularly in South Korea and the United States.

Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).