Category: IT|Apr 22, 2021 | Author: Admin

New threat: False data security

Share on

North Korean hackers have set up fake security companies as well as social media accounts, as part of a campaign targeting cybersecurity companies and employees to trick malware.

“Offensive Security”
The hackers have used at least two fake accounts on LinkedIn that mimic recruiters from antivirus software and security companies. One of the recruiters, "Carter Edwards", "works" in a company called "Trend Macro", which can quickly be confused with the real security company Trend Micro. The company also has its own Twitter account. Both LinkedIn and Twitter have removed the accounts permanently.

The fake business that hackers call "SecuriElite" claims to be based in Turkey and focused on offensive security, penetration testing, software security, and exploitation.

The hackers created the "company" in March 2021. Their Twitter account has only tweeted once and has only one follower.

This is not the first time North Korean hackers have set up a fake website and fake social media accounts to trick real security companies into downloading malicious software.

Associated with a country's authorities
Google previously unveiled a similar version of the campaign targeting bloggers. A seemingly legitimate security blog demonstrated the "vulnerability" of blogs or blogging platforms where bloggers could with a click find out if their blog was infected.

The fact that the hackers have revitalized the "security campaign" in recent days, indicates that they do not allow themselves to be deterred from having been exposed before. Google states without further specification that the grouping is affiliated with a country's authorities.

Pretty Good Privacy
The hackers do not appear to be targeting the SecuriElite campaign against specific targets, but on the website, they offer a link to their Pretty Good Privacy (PGP) key that is similar to the one used to distribute a browser add-on in the previous version of the offensive.

North Korean hackers have recently run a targeted campaign in which they have distributed infected Microsoft Word documents to employees of airlines and defense companies, according to McAfee.

Sponsored Ads:

Comments:


Only possible with VPN

Category: IT|Apr 22, 2024 | Author: Admin

Apple sidles into sideloading in the EU

Category: Apple|Apr 21, 2024 | Author: Admin

Report: Microsoft-OpenAI ownership might get conditional OK from EU regulators

Category: IT|Apr 20, 2024 | Author: Admin

Giant change at Google could change everything

Category: Google|Apr 19, 2024 | Author: Admin

Now Windows will be bothered about this too

Category: Microsoft|Apr 18, 2024 | Author: Admin

Test the new AI trick with Logitech

Category: IT|Apr 17, 2024 | Author: Admin

The US Government Has a Microsoft Problem

Category: Microsoft|Apr 16, 2024 | Author: Admin

Now comes the commercial

Category: Microsoft|Apr 15, 2024 | Author: Admin

Linux Foundation is leading fight against fauxpen source

Category: IT|Apr 14, 2024 | Author: Admin

3000 news articles!!! Happy reading!

Category: General|Apr 13, 2024 | Author: Admin

Google shuts down new product

Category: IT|Apr 12, 2024 | Author: Admin

YouTube CEO warns OpenAI that training models on its videos is against the rules

Category: IT|Apr 11, 2024 | Author: Admin

Google unveils Arm-based data center processor, new AI chip

Category: Google|Apr 10, 2024 | Author: Admin

Microsoft to invest $2.9 bln to expand AI, cloud infra in Japan

Category: Microsoft|Apr 9, 2024 | Author: Admin

Nintendo shuts off online access for 3DS and Wii U today

Category: IT|Apr 8, 2024 | Author: Admin
more