Understanding North Korean State-Sponsored Cyber Espionage Group APT37

 






To know more about it, you can go through my detailed document by clicking here




APT37

It's a North-Korean state-sponsored cyber threat group, hence it mainly targets the South-Korean public and private sectors including Japan, Vietnam, and the Middle East. It has targeted many industries like chemicals, electronics, manufacturing, aerospace, healthcare, etc. 

Cyber Attacks associated with APT37

This cyber threat group APT37 have targeted various South Korean sectors with RokRat Trojan, targets journalists using Chinotto multi-platform malware, etc. while focusing on the various sophisticated organizations of the attacked country.

Malware Tools used by APT37

APT37 is laced with a wide variety of malicious tools like NavRAT, CORALDECK, Karae, DOGCALL, ROKRAT, ScarCruft, SOUNDWAVE, ZUMKONG, MILKDRO, etc. which is capable of causing a big damage to any system or organization. 

Vulnerabilities Exploited by APT37

  • Exploits vulnerabilities in Hangul Word Processor (HWP), and Adobe Flash.
  • Access zero-day vulnerabilities and use them in their operations.
  • Its InkySquids can easily infect the victims with Browser exploits., etc...

Prevention

All-in-all APT37 although not one of the topmost cyber threat groups but organizations should be wary of it as it is very capable in causing lethal damages to any company. You should - always keep track of all the passwords especially during peak hours, provide rigorous training to your employees regarding data security, always be careful about new logins and act swiftly whenever warned by your system regarding any breach, etc...








To know more about it, you can go through my detailed document by clicking here


Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements