- Buy Microsoft Visio Professional or Microsoft Project Professional 2024 for just $80
- Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle
- Buy or gift a Babbel subscription for 78% off to learn a new language - new low price
- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
North Korean cybercriminal group ‘TA406’ escalates attacks through 2021 – SiliconANGLE
A new report from security researchers at Proofpoint Inc. details a North Korean-aligned threat actor undertaking attacks that have escalated through 2021.
Dubbed TA406, the threat actor is associated with the Kimsuky threat actor group, referred to by some as Thallium and Konni Group but a unique entity in its own right. The group undertakes various nefarious activities, including espionage, cybercrime and sextortion, focusing on targeting research, education, government, media and other organizations.
TA406 was first identified in 2018, but the threat actor’s campaigns remained low in volume until January. From January through to June, TA406 expanded its activity with almost weekly campaigns targeting foreign policy experts, journalists and nongovernmental organizations.
The group itself only sometimes uses malware and primarily targets potential victims through spear-phishing campaigns, which are targeted attempts to persuade people they’re providing information to someone they know. TA406, along with related groups TA408 and TA427, have one thing in common: The attacks are usually launched between 9 a.m. and 5 p.m. North Korean time, with a few exceptions. They also seemingly take a break for lunch.
TA406 targets primarily reside in North America, China and Russia. The group frequently masquerades as Russian diplomats and academics, Ministry of Foreign Affairs representatives, human rights officials or Korean individuals.
Although espionage is a motivating factor in some attacks, the group has also targeted individuals and organizations related to cryptocurrency for financial gain.
Some of the tactics used by TA406 are also interesting. The phishing aspects with either dubious attachments or fake login pages have been seen among many groups before, but TA406 takes the spear-phishing to the next level by creating fake LinkedIn accounts. In one case, there was a fake persona under the name of “Tomas Jimy” complete with the claim that Jimy was a researcher with Stanford University.
TA406 is usually predictable in the type of people it targets, but there are some exceptions. One campaign this year had drastically different targeting than normal for unknown reasons. The campaign occurred around the same time as the March 2021 North Korean missile tests and targeted several organizations and individuals not previously observed as targets for TA406.
The recipients of that campaign included some of the highest-ranking elected officials of several different governmental institutions, an employee at a consulting firm, government institutions related to defense, law enforcement, and economy and finance, plus generic mailboxes for board and customer relations at a large financial institution.
The report itself goes into much deeper details about the tools and methodology used by the group. The Proofpoint researchers conclude that TA406 will continue to conduct corporate credential theft operations frequently, targeting entities of interest to the North Korean government.