Telegram (AI) YouTube Facebook X
Ру
Telegram user de-anonymisation, exposure of North Korean spies, and other cybersecurity developments

Telegram user de-anonymisation, exposure of North Korean spies, and other cybersecurity developments

We’ve gathered the week’s most important cybersecurity news.

  • Experts uncover APT43 hackers, engaged in espionage on behalf of North Korea.
  • Media outlets reveal Rostec’s tool for de-anonymising Telegram users.
  • GitHub removed a private repository containing Twitter’s source code after a DMCA notice.
  • In Ukraine, authorities arrested a gang of phishers who stole $4.3 million from EU residents.

Experts uncover hackers APT43, engaged in espionage on behalf of North Korea

Analysts from Mandiant published a report on the North Korean hacking group APT43, which conducts espionage and cryptocurrency theft.

According to experts, the criminals are believed to be backed by North Korea’s General Reconnaissance Bureau, with the main targets including government and research institutions in the US, Europe, Japan and South Korea.

APT43 sends phishing emails impersonating fictitious officials, directing victims to controlled websites to harvest credentials. This enables the hackers to authenticate in target systems.

To steal funds, the group uses malicious Android applications targeted at cryptocurrency holders in China.

Stolen assets are laundered through mixers and cloud-mining services using fake aliases and addresses. For equipment and infrastructure, APT43 pays with PayPal, American Express and stolen Bitcoin.

GitHub removed the Twitter source code repository

GitHub removed the private repository of user FreeSpeechEnthusiast containing Twitter’s source code after a DMCA notice from the social network.

Sources cited by The New York Times say that the repository contained information about vulnerabilities in the security system that could allow hackers to exfiltrate user data or take Twitter offline.

The company is now seeking the court to compel GitHub to disclose identifying information about the culprit and those who gained access to it.

It is not known how long the source code remained on the network. Media reports say it was at least several months.

Trend Micro finds crypto-stealing malware OpcJacker

Trend Micro researchers discovered OpcJacker malware, which has been distributed since mid-2022 under the guise of cryptocurrency apps and other legitimate software on counterfeit sites.

OpcJacker features include keylogger, screenshots, theft of data from browsers, loading of additional modules and clipboard cryptocurrency address spoofing.

Upon infection, the malware replaces the legitimate DLL library inside the installed program with a malicious one. This enables it to load additional malicious payload — a modified Babadeda ransomware payload.

opcjacker-1
Data: Trend Micro.

The malware’s primary objective remains unknown, but its ability to steal cryptocurrency points to a financial motivation, say experts.

Roskomnadzor opposes anonymous numbers based on blockchain

Roskomnadzor has proposed using equipment installed at providers under the sovereign internet law to restrict access to anonymity tools. The agency singled out services that use virtual phone numbers. This includes numbers on the Fragment blockchain platform, which can purchased for cryptocurrency for anonymous Telegram registration.

If the government passes the amendments, they would take effect on 1 March 2024.

Ukraine arrests phishing gang that stole $4.3 million from EU residents

The Ukrainian Cyber Police uncovered participants of an international criminal organisation who used phishing to steal banking card data.

The suspects created more than 100 phishing sites selling cheap goods targeting European users. All customer payment information automatically became known to criminals. They then wired funds from their accounts.

The group also set up call centres in Vinnytsia and Lviv, whose operators encouraged potential victims to make purchases.

Over 1,000 victims from the Czech Republic, Poland, France, Spain, Portugal and other EU countries have been recorded. The total damage exceeds 160 million hryvnias ($4.3 million).

During a series of searches, law enforcement seized mobile phones, SIM cards and computer equipment. A criminal case has been opened for fraud and the creation of a criminal group. The suspects face up to 12 years in prison with confiscation of property.

Two organizers have been arrested. Ten more participants have been detained in the EU. The investigation continues.

Media reveal Rostec tool for de-anonymising Telegram users

Rostec, the Russian state corporation, has purchased a platform that enables revealing the identities of anonymous Telegram users. The investigation by The Bell and Meduza says.

According to them, the software suite named “Hunter” analyses more than 700 public data sources, including social networks, blogs, forums, messaging apps, classifieds, cryptocurrency blockchains, the dark web and state automated services.

The data allow names, nicknames, email addresses, phone numbers, crypto wallets and IP addresses to be linked and eventually identify Telegram channel administrators.

Journalists believe Rostec’s primary targets are authors critical of Russia’s state policy.

Public organisation Roskomsvoboda notes that using only data points cannot de-anonymise the channel owner. They suggest Rostec may also exploit a zero-day vulnerability in the platform or work with an insider inside Telegram.

A Telegram spokesperson told Bleeping Computer that the most common methods for de-anonymising channel administrators are accepting payments for advertising, granting access to third-party bots, or using unofficial Telegram apps.

Rostec plans to sell “Hunter” in 2023 to all Russian Interior Ministry administrations and the FSB’s operational-technical divisions.

Also on ForkLog:

What to read this weekend?

Together with HAPI Labs experts, we examine how “dirty” cryptocurrency becomes “clean” and how AML services should label it going forward.

Подписывайтесь на ForkLog в социальных сетях

Telegram (основной канал) Facebook X
Нашли ошибку в тексте? Выделите ее и нажмите CTRL+ENTER

Рассылки ForkLog: держите руку на пульсе биткоин-индустрии!

We use cookies to improve the quality of our service.

By using this website, you agree to the Privacy policy.

OK