North Korea-linked hackers go after defectors using malware-loaded apps in Play StoreMay 21, 2018
The Google Play store is not any stranger to seemingly legit apps that hosts malware, however McAfee researchers have found something a bit different: three malicious applications that targets specific people The security group says a North Korea-linked group uploaded the apps, which had been designed to infiltrate Android devices belonging to defectors from the country.
Whereas the phrase “North Korean hackers” often refers to the notorious Lazarus Group, on this instance the attacker is the Sun Group. It was behind a campaign known as RedDawn, which noticed malware-loaded apps added to the Play Store earlier than attempts were made at convincing defectors to download the software.
The three apps appeared in Google’s store between January and March this year. The first of these, known as Food Ingredients Info, offered information on food, as one might imagine. The other two—Fast AppLock and Fast AppLockFree—were security tools. All three were able to steal the personal data of those who downloaded them, which could then be used to blackmail, threaten, or track victims; this information included a user’s photos, contacts, call recordings, and SMS messages.
“After infecting a device, the malware uses Dropbox and Yandex to upload data and issue commands, including additional plug-in dex files; this is a similar tactic to earlier Sun Team attacks,” writes McAfee’s Jaewon Min.
“From these cloud storage sites, we found information logs from the same test Android devices that Sun Team used for the malware campaign we reported in January. The logs had a similar format and used the same abbreviations for fields as in other Sun Team logs. Furthermore, the email addresses of the new malware’s developer are identical to the earlier email addresses associated with the Sun Team.”
The Sun Team tried to get North Korean defectors, of which there were over 30,000 in 2016, to download the apps by using a fake Facebook profile or sending direct private messages via the site. A chat app popular in South Korea called KakaoTalk was also used to send links to the targets.
The apps, which have now been removed, recorded around 100 downloads during their time on the Google Play Store. Two fake Facebook profiles set up by the Sun Team are reportedly still active.
Further evidence linking the attacks to North Korea included an IP address belonging to the country that was found in a test log file, along with the fact that the authors used Korean words “not in South Korean vocabulary.” With North Korea threatening to halt its recent peace talks, we could see more attacks from the Sun Team in the future.