Most North Koreans don’t spend much of their lives in front of a computer. But some of the lucky few who do, it seems, have been hit with a remarkable arsenal of hacking techniques over the last year—a sophisticated spying spree that some researchers suspect South Korea may have pulled off.
Cybersecurity researchers at Google’s Threat Analysis Group today revealed that an unnamed group of hackers used no fewer than five zero-day vulnerabilities, secret hackable flaws in software, to target North Koreans and North Korea-focused professionals in 2019. The hacking operations exploited flaws in Internet Explorer, Chrome, and Windows with phishing emails that carried malicious attachments or links to malicious sites, as well as so-called watering hole attacks that planted malware on victims’ machines when they visited certain websites that had been hacked to infect visitors via their browsers.
Google declined to comment on who might be responsible for the attacks, but Russian security firm Kaspersky tells WIRED it has linked Google’s findings with DarkHotel, a group that has targeted North Koreans in the past and is suspected of working on behalf of the South Korean government.
It’s really impressive. It shows a level of operational polish.Dave Aitel, Infiltrate
South Koreans spying on a northern adversary that frequently threatens to launch missiles across the border is not unexpected. But the country’s ability to use five zero days in a single spy campaign within a year represents a surprising level of sophistication and resources. “Finding this many zero-day exploits from the same actor in a relatively short time frame is rare,” writes Google TAG researcher Toni Gidwani in the company’s blog post. “The majority of targets we observed were from North Korea or individuals who worked on North Korea-related issues,” In a followup email, Google clarified that a subset of the victims were not merely from North Korea, but in the country, suggesting that these targets weren’t North Korean defectors, whom the North Korean regime frequently targets.
Within hours of Google linking the zero-day vulnerabilities to attacks targeting North Koreans, Kaspersky was able to match two of the vulnerabilities—one in Windows, one in Internet Explorer—with those it has specifically tied to DarkHotel. The security firm had previously seen those bugs exploited to plant known DarkHotel malware on their customers’ computers. (Those DarkHotel-linked attacks occurred before Microsoft patched its flaws, Raiu says, suggesting that DarkHotel wasn’t merely reusing another group’s vulnerabilities.) Since Google attributed all five zero-days to a single hacker group, “it’s quite likely that all of them are related to DarkHotel,” Raiu says.
Raiu points out that DarkHotel has a long history of hacking North Korean and Chinese victims, with a focus on espionage. “They’re interested in getting information such as documents, emails, pretty much any bit of data they can from these targets,” he says. Raiu declined to speculate on what country’s government might be behind the group. But DarkHotel is widely suspected of working on behalf of the South Korean government, and the Council on Foreign Relations names DarkHotel’s suspected state sponsor as the Republic of Korea.