North Korea-linked hack hits largely invisible software that powers online services

By AJ Vicens March 31 (Reuters) – Hackers linked to North Korea breached behind-the-scenes software that runs many common online functions in an effort to steal login information that could โ€Œenable further cyber operations, Google said on Tuesday. The hackers targeted Axios, a program that โ€Œconnects apps and web services, by adding their own malicious…


North Korea-linked hack hits largely invisible software that powers online services

By AJ Vicens

March 31 (Reuters) – Hackers linked to North Korea breached behind-the-scenes software that runs many common online functions in an effort to steal login information that could โ€Œenable further cyber operations, Google said on Tuesday.

The hackers targeted Axios, a program that โ€Œconnects apps and web services, by adding their own malicious software to an update issued Monday, Google and independent cyber โ€‹researchers said after the hack came to light early on Tuesday.

โ€œEvery time you load a website, check your bank balance, or open an app on your phone, thereโ€™s a good chance Axios is running somewhere in the background making that work,โ€ said Tom Hegel, a senior researcher at SentinelOne.

The malicious โ€Œsoftware, which has since been removed, โ could have given hackers access to a computer’s data including access credentials, which can then be used to carry out additional data theft or other kinds โ of attacks.

The developers of Axios could not immediately be reached for comment. Rather than a proprietary commercial product, the software is open source, meaning the code can be openly licensed and modified by users.

The โ€‹cyber researchers โ€‹described the breach as a supply chain attack, in โ€‹which the hack could enable attacks on โ€Œdownstream entities.

โ€œYou donโ€™t have to click anything or make a mistake,โ€ Hegel said. โ€œThe software you already trust did it for you.โ€

Google attributed the hack to a group it tracks as UNC1069. Google said in a February report the group has operated since at least 2018 and is known for targeting the cryptocurrency and financial industries.

โ€œNorth Korean hackers have deep experience with supply chain attacks, which โ€Œthey primarily use to steal cryptocurrency,โ€ John Hultquist, chief analyst โ€‹for Google’s threat intelligence group, said in a statement.

North โ€‹Korea uses stolen crypto to fund its โ€‹weapons and other programs, and evade sanctions, according to the U.S. government.

North Koreaโ€™s โ€Œmission to the U.N. did not immediately โ€‹respond to a request โ€‹for comment.

The hackers created versions of the malware that could infect macOS, Windows and Linux operating-system versions, according to an analysis published by cybersecurity firm Elastic Security.

The hackers’ methods meant “the โ€‹attacker gained a delivery mechanism โ€Œwith potential reach into millions of environments,” Elastic said. It was not clear how โ€‹many times the malicious software was downloaded.

Efforts to contact the hackers were unsuccessful.

(Reporting by โ€‹AJ Vicens in Detroit; Editing by Cynthia Osterman)

Source link