US: N. Korean malware lurking in PC networks
WASHINGTON — US authorities said Tuesday malware developed in North Korea is still lurking in many computer networks, giving hackers backdoor access to government, financial, automotive and media organizations.
An alert issued by the Department of Homeland Security warned of surreptitious activity by the so-called 鈥淗idden Cobra鈥 hacker group, also known by the name 鈥淟azarus.鈥
US officials earlier this year blamed the group for a series of cyberattacks dating back to 2009, saying it was linked to the Pyongyang government.
In Tuesday鈥檚 warning, the DHS Computer Emergency Response Team (CERT) said the hacker could still maintain a presence on victims鈥 networks with the aim of 鈥渇urther network exploitation.鈥
The report said some networks could be infected with the Volgmer 鈥渂ackdoor Trojan鈥 or a remote administration tool known as Fallchill, which can give hackers complete control of a system.
It said FBI investigators suspect the Fallchill tool has been used since 2016 and Volgmer since 2013.
Private security analysts refer to Hidden Cobra as the 鈥淟azarus鈥 group of hackers linked to North Korea and likely behind a series of multimillion-dollar cyber thefts from banks around the world.
Some analysts say the Lazarus group may also have been behind the WannaCry ransomware outbreak earlier this year.
Hackers in the Hidden Cobra or Lazarus group have been active since 2009 and 鈥渉ave leveraged their capabilities to target and compromise a range of victims,鈥 according to a DHS report in June.
DHS and FBI officials say the group 鈥渨ill continue to use cyber operations to advance their government鈥檚 military and strategic objectives,鈥 according to the DHS report.
North Korea has denied orchestrating any cyberattacks, but the latest report comes amid rising tensions with the US over the communist regime鈥檚 nuclear testing program. — AFP


