Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data Summary:
Summary: Link(s):
A North Korean APT group, Kimsuky, was discovered using a malicious Google Chrome extension codenamed TRANSLATEXT to target South Korean academia focused on North Korean affairs in March 2024. Kimsuky is a notorious hacking crew from North Korea that's known to be active since at least 2012, orchestrating cyber espionage and financially motivated attacks targeting South Korean entities. TRANSLATEXT steals email addresses, usernames, passwords, cookies, and browser screenshots by masquerading as the legitimate translation tool, Google translate. The extension leverages JavaScript to bypass security measures for prominent services like Gmail, Kakao, and Naver. It can also capture screenshots and delete cookies upon receiving commands.
The initial attack vector is yet to be identified, but Kimsuky is known to employ spear-phishing and social engineering tactics. Security researchers believe the starting point of the attack is a ZIP archive containing a decoy document and a malicious executable might be part of the initial distribution method. Launching the executable triggers a series of actions, including downloading additional malicious PowerShell scripts from and uploading stolen data to attacker-controlled servers. Zscaler researchers said they found the GitHub account, created on February 13, 2024, briefly hosting the TRANSLATEXT extension under the name "GoogleTranslate.crx," although its delivery method is presently unknown. The group has also weaponized a Microsoft Office security flaw in recent weeks aims to drop another espionage tool and establish persistence via a previously undocumented backdoor.
Security Officer Comments:
This incident highlights the evolving tactics of North Korean cyber actors. Kimsuky's use of a malicious Chrome extension demonstrates their focus on exploiting trust in popular software to gain access to sensitive information. The focus on South Korean academia suggests an interest in gathering intelligence on North Korean political affairs. Educational institutions, particularly those in South Korea with research interests in North Korea, should be aware of this ongoing campaign. In recent weeks, the group has weaponized a known security flaw in Microsoft Office (CVE-2017-11882) to distribute a keylogger and has used job-themed lures in attacks aimed at aerospace and defense sectors to drop an espionage tool with data gathering and secondary payload execution functionalities in a different campaign. It is crucial to stay informed about the latest cyber threats and exercise caution when installing extensions from untrusted sources. Organizations can mitigate these risks by implementing security awareness training programs and enforcing stricter protocols for software installation.
Suggested Corrections:
IOCs for this campaign are published here.
https://thehackernews.com/2024/06/kimsuky-using-translatext-chrome.html