North Korean hackers have some deious new Linux backdoor attacks to target victims


Kimsuky, an infamous North Korean state-sponsored threat actor, has been using a brand new backdoor to target victims’ Linux devices.
Cybersecurity researchers Symantec, who call the backdoor Gomir, are claiming the new threat is basically a fork of the GoBear backdoor.
Among the similarities between Gomir and GoBear are direct C2 communication, persistence methods, and different capabilities, such as pausing communications with C2, running arbitrary shell commands, changing the working directory, probing network endpoints, reporting system configuration details, starting a reverse proxy for remote connections, creating arbitrary files on the system, exfiltrating files from the system, and more.
North Korean cyber-espionage
All of these are “almost identical” to what GoBear does on a Windows machine, Symantec said.
Being a state-sponsored group, Kimsuky usually targets high-value organizations, in both private and public sectors, abroad (mostly South Korea). In many previous instances, Kimsuky was spotted engaging in supply chain attacks, compromising legitimate software which is later used by target organizations, which was most likely the case here, as well.
Kimsuky is also known as Thallium or Velvet Chollima. The group has been active since at least 2012 and, besides South Korea, is known for targeting entities in the United States, Japan, and other countries. Their primary focus is on intelligence gathering and cyber espionage rather than financial gain.
The group usually engages in spear phishing and social engineering to deploy infostealing malware to their victims. Some of the biggest campaigns and incidents include the 2013 Operation Kimsuky (targeting South Korean think tanks and universities), Covid-19-related attacks from 2020 (targeting organizations engaged in developing the vaccine), and energy sector attacks in 2021.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Since phishing is Kimsuky’s number one compromise method, the best way to defend against the group is to educate and train employees on how to spot and respond to phishing emails.
More from TechRadar Pro
Kimsuky, an infamous North Korean state-sponsored threat actor, has been using a brand new backdoor to target victims’ Linux devices. Cybersecurity researchers Symantec, who call the backdoor Gomir, are claiming the new threat is basically a fork of the GoBear backdoor. Among the similarities between Gomir and GoBear are direct…
Recent Posts
- Top digital loan firm security slip-up puts data of 36 million users at risk
- Nvidia admits some early RTX 5080 cards are missing ROPs, too
- I tried ChatGPT’s Dall-E 3 image generator and these 5 tips will help you get the most from your AI creations
- Gabby Petito murder documentary sparks viewer backlash after it uses fake AI voiceover
- The quirky Alarmo clock is no longer exclusive to Nintendo’s online store
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010