Threat Signal Report
Latest Joint CISA and FBI Report on North Korean Remote Access Trojan - BLINDINGCAN
Today, the United States Cybersecurity and Infrastructure Security Agency (CISA), in conjunction with the Federal Bureau of Investigation (FBI), released a new malware analysis report (also known as MAR reports) that have attributed malicious cyber activity to the North Korean government - also known as HIDDEN COBRA/LAZARUS. Contained within these sample sets are (6) unique samples. The names associated with this malware variant by CISA are: BLINDINGCAN.
The lure used were job postings from well known defense organizations targeting government contractors in the energy and military verticals. Microsoft Word documents (four Microsoft Word documents and and two DLL files) when opened, connected to an attacker controlled C2 to install an implant that would allow for the ongoing monitoring and persistence on the victim environment/machine. The DLL files (32 or 64 bit) will install a file named icondcache.db, and when unpacked, installs a remote access trojan (RAT).
Why is Hidden Cobra Significant?
HIDDEN COBRA has been linked to multiple high profile attacks which have caused massive infrastructure disruptions, as well as financially motivated attacks in various parts of the world. Notable attacks were the 2014 Sony Pictures attack and the 2016 Bangladeshi heist that almost netted 1 Billion (USD) for the attackers. Had it not been for a misspelling in an instruction that caused The Federal Reserve Bank of New York to flag and to block thirty transactions; HIDDEN COBRA would have pulled off a heist unseen like any other. Although HIDDEN COBRA failed at their attempt, they were still able to net around 81 million dollars. The most notable attack attributed to HIDDEN COBRA in recent memory was the Wannacry Ransomware attack, which resulted in massive disruption and damage worldwide to numerous organizations, especially manufacturers. Various estimates of the Wannacry impact were estimated in the hundreds of millions of dollars with some estimates claiming to be in the billions. Other verticals targeted are critical infrastructures, entertainment, finance, healthcare and telecommunication sectors, across multiple countries in the past.
What is the Severity of Impact?
The severity should be regarded as low, due to the fact that these campaigns have been observed limited to targeted attacks.
It Appears that Some Malware Variants (such as HOPLIGHT, etc.) Have Been Reported Before. Is this Incorrect?
No. These are primarily updates to previous reports; associated to a specific malware family used by HIDDEN COBRA/LAZARUS. Other campaigns observed and attributed to HIDDEN COBRA over the past 12 months for reference are: HOPLIGHT, BISTROMATH, SLICKSHOES, CROWDEDFLOUNDER, HOTCROISSANT, ARTFULPIE, AND BUFFETLINE.
What is the Status of AV/IPS and Web Filtering Coverage?
For publicly available samples, customers running the latest definition sets are protected by the following (AV) signature:
All network IOC's have been blocked by the Web Filtering client.
Traffic Light Protocol
|Color||When Should it Be used?||How may it be shared?|
TLP: REDNot for disclosure, restricted to participants only.
|Sources may use TLP:RED when information cannot be effectively acted upon by additional parties, and could lead to impacts on a party's privacy, reputation, or operations if misused.||Recipients may not share TLP:RED information with any parties outside of the specific exchange, meeting, or conversation in which it was originally disclosed. In the context of a meeting, for example, TLP:RED information is limited to those present at the meeting. In most circumstances, TLP:RED should be exchanged verbally or in person.|
TLP: AMBERLimited disclosure, restricted to participants’ organizations.
|Sources may use TLP:AMBER when information requires support to be effectively acted upon, yet carries risks to privacy, reputation, or operations if shared outside of the organizations involved.||Recipients may only share TLP:AMBER information with members of their own organization, and with clients or customers who need to know the information to protect themselves or prevent further harm. Sources are at liberty to specify additional intended limits of the sharing: these must be adhered to.|
TLP: GREENLimited disclosure, restricted to the community.
|Sources may use TLP:GREEN when information is useful for the awareness of all participating organizations as well as with peers within the broader community or sector.||Recipients may share TLP:GREEN information with peers and partner organizations within their sector or community, but not via publicly accessible channels. Information in this category can be circulated widely within a particular community. TLP:GREEN information may not be released outside of the community.|
TLP: WHITEDisclosure is not limited.
|Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release.||Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction.|