Spearphishing from North Korea

B2B Cyber ​​Security ShortNews
Advertising

Share post

The US government warns of threat actors from North Korea. As a result, they use weak email DMARC (Domain-based Message Authentication Reporting and Conformance) settings to send fake spearphishing emails as if they came from a legitimate email address.

“We have observed that North Korean threat actors like APT43 are exploiting the flawed DMARC configurations to easily spoof well-known institutions at major universities, think tanks and NGOs. This allowed them to target prominent facilities in specific areas and collect high-priority intelligence for the North Korean regime. They did this by spoofing the email addresses of legitimate users from legitimate organizations to contact victims. It's a common but easy to fix problem.

Advertising

Spying for North Korea

This tactic allows threat actors to gather information about impending sanctions from Western governments and to obtain information about the nuclear deterrence and armament of the United States and its allies so that the regime can better prepare. DPRK threat actors can also use the trust they have built with their target to later send malware via a malicious link or attached document. This is a highly effective new tool in the arsenal of one of the most prolific social engineering threat groups tracking Mandiant. Their attacks are not limited to non-governmental organizations and think tanks. Organizations in a variety of industries around the world are at risk of making themselves unnecessarily vulnerable. Proper DMARC configuration coupled with proper SPF/DKIM management are simple steps to effectively prevent phishing and spoofing of an organization.” Gary Freas, Mandiant Senior Analyst at Google Cloud

“Gmail has a long-standing commitment to strong authentication, which is critical to the health of the entire open and connected email ecosystem. Standards like DMARC help increase trust in the source and authenticity of a message, which is beneficial for both recipients and email senders. That's why we recently began requiring mass senders to implement DMARC and other key security and authentication standards to protect billions of Gmail users." Neil Kumaran, Group Product Manager, Gmail Security & Trust

Advertising
More at Mandiant.com

 


About Mandiant

Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response. With decades of experience on the cyber frontline, Mandiant helps organizations confidently and proactively defend against cyber threats and respond to attacks. Mandiant is now part of Google Cloud.


 

Matching articles on the topic

MITRE CVE program remains in place for the time being

The CVE program, funded by the US government, is considered a crucial component in the global detection of software flaws. Now, funding is to be temporarily suspended. ➡ Read more

LockBit leak site hacked and data stolen

Now LockBit has also become the victim of another hacker: It seems that not only the leak page of the group was hacked, but ➡ Read more

F5 BIG-IP: BSI warns of highly dangerous vulnerabilities

The BSI has issued a warning about F5 products, as they contain several highly dangerous security vulnerabilities that should be closed. The BIG-IP ➡ Read more

Iran, North Korea, Russia: State hackers rely on ClickFix 

State-sponsored hacker groups are increasingly adopting new social engineering techniques originally developed by commercially motivated cybercriminals. ClickFix, for example, is now increasingly ➡ Read more

TA4557: Venom Spider targets HR departments

TA4557, better known as Venom Spider, is increasingly exploiting phishing and trying to deploy its backdoor malware. The focus of the ➡ Read more

Oettinger Brewery attacked by ransomware

The APT group Ransomhouse claims to have successfully attacked the German brewery Oettinger with ransomware. On the APT group's leak page ➡ Read more

Healthcare facilities: 90 percent are at high risk

The current report “State of CPS Security: Healthcare Exposures 2025” shows the most dangerous vulnerabilities of medical devices in networks of ➡ Read more

Google Cloud Run: ImageRunner vulnerability discovered

The ImageRunner privilege escalation vulnerability in Google Cloud Run could have allowed attackers to bypass access controls, gain unauthorized access to container images ➡ Read more