North Korean Botnet Attacked by FBI

The North Korean Cyberwar Operations group is known variously as Lazarus Group, Guardians of Peace, or Hidden Cobra. A few of their notable achievements include the 2014 attack on Sony Pictures inspired by the satirical Seth Rogan film “The Interview, ” the $81 million cyber bank heist  against Bangladesh’s central bank, and the 2017 WannaCry ransomware attack.

In June 2017, US-CERT sent a  public warning to US businesses about the danger of North Korean cyber-attacks and the need to patch old software to defend against them.  The type of attacks that the North Koreans were using included DDoS (distributed denial of service) botnets, remote access Trojan horse programs (RAT) such as the Jonap RAT, disk wiping and data destruction programs, keylogging credential stealing programs, and Windows SMB (server message block) exploits such as the WannaCry, Brambul, and Eternal Blue worms.

The current North Korean botnet has been built using the Brambul SMB worm to hijack and gain access to victim computers, and the Jonap RAT to recruit and join the computer to the botnet. The FBI got a court order and search warrant in a California court in October.  This gave the FBI and the US Air Force Office of Special Investigations (AFOSI) the legal authority to operate servers that pretended to be infected systems in the Jonap botnet.

The FBI and the US Air Force successfully infiltrated the botnet.  They have been able to identify many of the affected computers.  The victims of this attack are being notified by their Internet Service Providers, or by direct notifications.  The FBI is contacting other national governments to inform them about victims in their jurisdictions.

The good news is if you have been keeping your computer patched with the latest Windows updates, and have been using a fully updated version of any anti-malware program, then your computer is probably not affected.  You still might keep your eye out for an email from your ISP.  This will not be a hoax, and you should follow the directions to clear this malware from your computer.  You may want to hire a qualified professional who is familiar with this exploit to do the work for you.

If you are an IT professional responsible for a business network, you may want to read the information linked below to learn about the tactics and techniques and indicators of compromise.  This should make it easier to scan your network for infection and remediate any affected systems.

More information:

0

About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Owner of the WyzCo Group Inc. In addition to consulting on security products and services, Bob also conducts security audits, compliance audits, vulnerability assessments and penetration tests. Bob also teaches Cybersecurity Awareness Training classes. Bob works as an instruction for CompTIA’s non-profit IT-Ready Program in the Twin Cities. IT-Ready is a tuition free 8-week program designed to teach students of all ages the fundamentals of IT support to prepare them for an entry level position in Information Technology Support. Graduates of the classes take the exams to become CompTIA A+ certified. Bob is a frequent speaker at conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. Bob has been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com
  Related Posts

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.