In the process of tracking the attacks of the Kimsuky group, which are still attacking after the KHNP cyber terror attack, we discovered a malicious code called "AppleSeed" in the wild and released details of it at VB2019. (https://www.virusbulletin.com/conference/vb2019/abstracts/kimsuky-group-tracking-king-spear-phishing))
Since then, AppleSeed malware and the simple pivoting of servers have relentlessly pushed other victims, with those cases reported in technical articles written by security companies and via SNS messages by security practitioners. However, although AppleSeed is still actively working in the real world, the full-chain attack leveraging AppleSeed has not been clearly disclosed so far.
Thus, to shed some light on this sophisticated attack scenario, we conducted an in-depth analysis of the full-chain attack of AppleSeed; from the initial penetration to the final damage targeting scientific/engineering researchers among various attack cases, and named it “Operation Newton”.
In our analysis, we identified the initial penetration method, tools used in the attack including AppleSeed, and infrastructure such as C&C servers. In addition, we discovered and analysed artifacts related to attacks targeting multiple platforms (Linux environments other than Windows).
Also, using first-hand artifacts and IoCs obtained in the process of analysing and investigating actual accidents related to AppleSeed, rather than data obtained from the OSINT channel, a correlation analysis with other attacks (incidents) of the Kimsuky group was conducted.
In the course of tracking AppleSeed, an attacker's mistake (OPSEC fail) was discovered in addition to the previously disclosed content.
And in this process, we expected to share information about the "mobile version of AppleSeed" and server-side scripts (which have not been disclosed) to understand and analyse the communication method and server configuration method.
In this presentation, we intend to provide threat intelligence related to the Kimsuky group by sharing previously unknown details.
Got a question about this presentation? To get in touch with the speakers, contact Jaeki Kim by email on [email protected] or on Twitter at @2runjack2.