{"id":1459,"date":"2021-04-01T18:14:06","date_gmt":"2021-04-01T12:44:06","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1459"},"modified":"2021-06-07T11:04:01","modified_gmt":"2021-06-07T05:34:01","slug":"north-korean-hackers-again-started-targeting-security-researchers-google","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/","title":{"rendered":"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">Google said that the North Korean Hackers are again started targeting the security researchers using fake social media accounts.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">According to Google Threat Analysis Group (TAG) said that the attackers will create a fake organization identified as SecuriElite which is located in Turkey and the organization is offering multiple security services.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"560\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-image-1024x560.png\" alt=\"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google\" class=\"wp-image-1460\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-image-1024x560.png 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-image-300x164.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-image-768x420.png 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-image.png 1159w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">As the Google security team focused on the website they focused to hunt it down from the 17th of March. The hackers use fake Twitter and Linked-In accounts and Google disabled these accounts after they know the accounts are linked with this attack.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">However, the experts identified the attack in January 2021 and the website was hosted by the hackers by using the public key which is used to infect the security researchers having the malware that triggers the browser that exploits by opening the web-page.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Whereas, these types of attacks are stated from very early before the websites named as SecuriElite wasn\u2019t created and used for delivering the malicious payloads to the users. The experts also said that this time we are not aware of this new attacker and the website that serves the malicious content but we are using Google Safe-browsing while revoking the attacks.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">According to the investigation, the experts said that these attackers are very dangerous and utilized multiple zero days.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How they Targets Zero-Days Malware?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify\">In January 2021, the North Korean Hackers identified as Lazarus Group targeted the security researchers by using the social engineering techniques and fake accounts that trapped the researchers. In these types of attacks, the hackers sent the malicious Visual Studio Project links that are connected to the website hosting exploit which is further used or designed for executing the backdoors and targeted the security researchers.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"560\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-image-1-1024x560.png\" alt=\"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google\" class=\"wp-image-1461\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-image-1-1024x560.png 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-image-1-300x164.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-image-1-768x420.png 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-image-1.png 1159w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">Some security researchers are using the fully updated version of Windows and also executing the most recent version of Google Chrome are got trapped in these attacks that shows that hackers are accessing some zero-day vulnerabilities while infecting the device.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Apart from this, another Internet Zero-Day Exploit was discovered by Cybersecurity hackers. However, Microsoft also reported about these attacks which were further identified as Lazarus Operators that were used for sending emails from the malicious java-script to the security researchers.<\/p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google said that the North Korean Hackers are again started targeting the security researchers using fake social media accounts. According to Google Threat Analysis Group (TAG) said that the attackers will create a fake organization identified as SecuriElite which is located in Turkey and the organization is offering multiple security services. As the Google security [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1501,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>North Korean Hackers Again Started Targeting Security Researchers \u2013 Google - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Google said that the North Korean Hackers are again started targeting the security researchers using fake social media accounts. According to Google Threat Analysis Group (TAG) said that the attackers will create a fake organization identified as SecuriElite which is located in Turkey and the organization is offering multiple security services. As the Google security [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-01T12:44:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T05:34:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-featured-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google\",\"datePublished\":\"2021-04-01T12:44:06+00:00\",\"dateModified\":\"2021-06-07T05:34:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/\"},\"wordCount\":374,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Consulting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/\",\"url\":\"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/\",\"name\":\"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-04-01T12:44:06+00:00\",\"dateModified\":\"2021-06-07T05:34:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/","og_locale":"en_US","og_type":"article","og_title":"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google - Xiarch Solutions Private Limited","og_description":"Google said that the North Korean Hackers are again started targeting the security researchers using fake social media accounts. According to Google Threat Analysis Group (TAG) said that the attackers will create a fake organization identified as SecuriElite which is located in Turkey and the organization is offering multiple security services. As the Google security [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-04-01T12:44:06+00:00","article_modified_time":"2021-06-07T05:34:01+00:00","og_image":[{"width":1000,"height":520,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/north-korean-hackers-target-researcher-featured-image.png","type":"image\/png"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google","datePublished":"2021-04-01T12:44:06+00:00","dateModified":"2021-06-07T05:34:01+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/"},"wordCount":374,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Consulting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/","url":"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/","name":"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-04-01T12:44:06+00:00","dateModified":"2021-06-07T05:34:01+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/north-korean-hackers-again-started-targeting-security-researchers-google\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"North Korean Hackers Again Started Targeting Security Researchers \u2013 Google"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1459"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1459"}],"version-history":[{"count":2,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1459\/revisions"}],"predecessor-version":[{"id":1502,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1459\/revisions\/1502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1501"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}