After a series of hacks against South Korea’s nuclear research and defense sectors, the cybersecurity firm TeamT5 said a group linked to North Korea likely used a previously unknown vulnerability and new malicious tools to break into the highly sensitive systems.
According to a report published on Wednesday, researchers said they believe a group labelled “CloudDragon” used a so-called zero-day exploit called MemzipRAT to install a backdoor and gain access to the organizations’ networks. The experts consider CloudDragon to be one of two sub-groups commonly referred to as Kimsuky, which has long been suspected of working on behalf of the DPRK.
After a series of hacks against South Korea’s nuclear research and defense sectors, the cybersecurity firm TeamT5 said a group linked to North Korea likely used a previously unknown vulnerability and new malicious tools to break into the highly sensitive systems.
According to a report published on Wednesday, researchers said they believe a group labelled “CloudDragon” used a so-called zero-day exploit called MemzipRAT to install a backdoor and gain access to the organizations’ networks. The experts consider CloudDragon to be one of two sub-groups commonly referred to as Kimsuky, which has long been suspected of working on behalf of the DPRK.
Try unlimited access
Only $1 for four weeks
-
Unlimited access to all of NK News: reporting, investigations,
analysis
-
Year-one discount if you continue past $1 trial period
-
The NK News Daily Update, an email newsletter to keep you in
the loop
-
Searchable archive of all content, photo galleries, special columns
-
Contact NK News reporters with tips or requests for reporting
Get unlimited access to all NK News content, including original reporting,
investigations, and analyses by our team of DPRK experts.
Subscribe
now
All major cards accepted. No commitments – you can cancel any time.