President Trump's nuclear diplomacy with North Korea may have yielded an unexpected benefit for North America: reduced cyberattacks from at least one group associate with the North Korean regime.
Covellite, a group associated with attacks on electrical and other critical facilities, as well the theft of intellectual property, has ceased its activity in North America after being active since at least the middle of 2017, according to Dragos, a company that specializes in industrial control system (ICS) security.
This cyberespionage group has also targeted facilities in Asia and Europe.
Dragos has observed Covellite use phishing emails that contain malicious Microsoft Word documents, typically ones that look similar to resumes or invitations, to deliver malware and infect systems. These documents contain remote access tools (RATs), and once the payload is delivered, the malware allows the group to conduct industrial espionage and gain access to other parts of the network.
Now, however, the group's activities seem to be on hold, especially in North America, according to Dragos:
COVELLITE remains active but appears to have abandoned North American targets, with indications of activity in Europe and East Asia. Given the group's specific interest in infrastructure operations, rapidly improving capabilities, and history of aggressive targeting, Dragos considers this group a primary threat to the ICS industry.
In their May 31 report, Dragos researchers note that Covellite's malware and infrastructure is similar to another North Korean-backed group, which is alternatively called the Lazarus Group by some, and Hidden Cobra by others.
Now entering its fifth year, the 2020 Vision Executive Summit is an exclusive meeting of global CSP executives focused on navigating the disruptive forces at work in telecom today. Join us in Lisbon on December 4-6 to meet with fellow experts as we define the future of next-gen communications and how to make it profitable.
While Covellite and Lazarus do share some technical similarities, it's not clear if the two groups work in conjunction. In fact, despite the fact that Covellite has backed away from attacking US targets, the FBI and US Department of Homeland Security issued a joint warning last week about two different strains of malware stemming from the Hidden Cobra group that is targeting industries including media, aerospace and finance as well a critical infrastructure. (See FBI & DHS Warn About 2 North Korea Malware Threats .)
Maybe not every cyberespionage group got the memo that the US and North Korea summit is still scheduled for June 12.
5G technology holds a good deal of promise for businesses, from expanded IoT capabilities to new ways to reach customers. The downside is that these networks require a new security approach, which InfoSec teams need to start thinking about now.
Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.
With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.
In an era when enterprises are scrambling to keep up with security demands, a new industry survey from ISF finds that having more diverse skills on the InfoSec team is one way to ensure a more stable workforce.
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.