Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Mandiant Shines Spotlight on APT45 Behind North Korea’s Digital Military Machine

A fresh Mandiant report documents North Korea’s APT45 as a distinct hacking team conducting cyberespionage and ransomware operations.

North Korea hackers

The inner workings of North Korea’s government-run hacking operations came into sharper focus this week with a new Mandiant report documenting the emergence of APT45 as an aggressive ransomware actor targeting healthcare providers, financial institutions, and energy companies.

The newly designated APT45, tracked for many years as Andariel or Silent Chollima, is known for cyberespionage operations supporting strategic interests of Kim Jung Un’s regime but has more recently expanded operations to include data-extortion ransomware attacks against very sensitive targets.

The new Mandiant report coincides with a mass-advisory from the U.S. government and its allies exposing the tools and tactics used by the dangerous North Korea hacking group. A Mandiant spokesman said the company has worked closely with multiple U.S. government agencies, including the FBI, to track this group’s efforts to acquire defense and R&D intelligence.

The multi-agency bulletin is expected to highlight how the DPRK hackers targeted information about heavy and light tanks and self-propelled howitzers, light strike vehicles and ammunition supply vehicles, Littoral combat ships and combatant craft and submarines, torpedoes, unmanned underwater vehicles (UUV), and autonomous underwater vehicles (AUV).

“When Kim Jong Un demands better missiles, these are the guys who steal the blueprints for him,” said Michael Barnhart, who leads Mandiant’s North Korean threat hunting team. “APT45 isn’t bound by ethical considerations and has demonstrated they’re willing and agile enough to target any entity to achieve their objectives, including hospitals.”

Although the group’s earliest observed activities consisted of espionage campaigns against government agencies and defense industries (mostly in South Korea), Mandiant’s researchers found that APT45 expanded to financially-motivated operations, including targeting of the financial vertical.

Advertisement. Scroll to continue reading.

“We also assess with moderate confidence that APT45 has engaged in the development of ransomware,” the incident response firm said. “The group has conducted operations against nuclear-related entities, underscoring its role in supporting DPRK priorities.”

In addition to an interest in launching ransomware attacks, Mandiant found APT45 directly targeted nuclear research facilities and nuclear power plants such as the Kudankulam Nuclear Power Plant in India, marking one of the few publicly known instances of North Korean cyber operations targeting critical infrastructure.

While Mandiant is carefully hedging its attribution of APT45 to ransomware attacks, the company pointed to public reporting that the group has been conducting financial crime to fund their operations or generate revenue for the regime. 

While Mandiant cannot confirm that ransomware is part of APT45’s arsenal, it pointed to the U.S. government’s cybersecurity agency CISA warnings on North Korean state-sponsored actors’ use of MAUI ransomware to target the healthcare and public health sectors. 

Like most hacking teams out of North Korea, Mandiant said APT45 malware exhibits distinct shared characteristics over time, including the re-use of code, unique custom encoding, and passwords. 

Mandiant published a VirusTotal Collection featuring APT45-related indicators of compromise to help defenders hunt for signs of infections.

Related: KnowBe4 Hires Fake North Korean, Catches New Employee Planting Malware 

Related: North Korean Threat Actor Engaging in Espionage, Revenue Generation Attacks

Related: North Korean .Gov Hackers Back With Fake Pen-Test Company

Related: Google Warning: North Korean Gov Hackers Targeting Security Researchers

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.