Track Common Adversary Tasks Performed Using BLUELIGHT
To know more about it, you can go through my detailed document by clicking here
Overview
BLUELIGHT is a Remote Access Trojan (RAT), generally used by APT37 (recently in 2021) which is a North-Korean state-sponsored cyber threat group that mainly targets the South-Korean public and private sectors including Japan, Vietnam, and the Middle East. It has targeted many industries like chemicals, electronics, manufacturing, aerospace, healthcare, etc.
Cyber Attacks
These cyber threat actors have targeted various South Korean sectors with RokRat Trojan, targets journalists using Chinotto multi-platform malware, etc. while focusing on the various sophisticated organizations of the attacked country.
Other Malware Tools used by APT37
APT37 is laced with a wide variety of malicious tools like NavRAT, CORALDECK, Karae, DOGCALL, ROKRAT, ScarCruft, SOUNDWAVE, ZUMKONG, MILKDRO, etc. which is capable of causing a big damage to any system or organization.
Vulnerabilities Exploited
- Exploits vulnerabilities in Hangul Word Processor (HWP), and Adobe Flash.
- Access zero-day vulnerabilities and use them in their operations.
- Its InkySquids can easily infect the victims with Browser exploits., etc...
Prevention
All-in-all although they are not one of the topmost cyber threat groups, but organizations should be wary of them as they are very much capable in causing lethal damages to any company. You should - always keep track of all the passwords especially during peak hours, provide rigorous training to your employees regarding data security, always be careful about new logins and act swiftly whenever warned by your system regarding any breach, etc...
To know more about it, you can go through my detailed document by clicking here
Comments
Post a Comment