Begin typing your search above and press return to search.
Outlook for BJP in Kerala
access_time 2021-05-06T11:21:07+05:30
Not Covid deaths, but mass murder
access_time 2021-05-05T10:52:36+05:30
Poll results that carry lessons
access_time 2021-05-04T10:39:06+05:30
The whistles of danger that must be heard
access_time 2021-04-30T11:44:21+05:30
Iran and the revival of JCPOA
access_time 2021-04-23T13:21:09+05:30
A model mosque in Gujarat
access_time 2021-04-12T17:13:34+05:30
Towards a digital emergency?
access_time 2021-02-27T14:50:41+05:30
The slaughter of democracy in Puducherry
access_time 2021-02-24T11:27:21+05:30
Populist Fascism
access_time 2021-01-31T17:19:29+05:30
Media Freedom
access_time 2021-01-31T15:47:07+05:30
Homechevron_rightTechnologychevron_rightNorth Korean hackers...

North Korean hackers using social media to target researchers: Google

North Korean hackers using social media to target researchers: Google

In a report published today, Google has revealed that its Threat Analysis Group (TAG) has identified what appears to be a group of North Korean government-backed hackers using social media to target cybersecurity researchers.

Google TAG member Adam Weidemann called it an "ongoing campaign" that targeted security researchers working on "vulnerability research and development" in a blog post published on Tuesday. The North Korean group uses social media platforms like Twitter, LinkedIn, Telegram, Discord, Keybase and E-mail to get access to these researchers who work on identifying security issues in software.

"In order to build credibility and connect with security researchers, the actors established a research blog and multiple Twitter profiles to interact with potential targets," Weidemann wrote. "They've used these Twitter profiles for posting links to their blog, posting videos of their claimed exploits and for amplifying and retweeting posts from other accounts that they control."

The hackers would build a rapport with researchers and invite them to collaborate on finding bugs and vulnerabilities in security software which they would then try to exploit, Weidemann said. They would also invite researchers onto a blog hosted by the hackers and then install a software that would allow the researcher's computer to be accessed by the hacker.

"At this time we're unable to confirm the mechanism of compromise," said Weidemann although he welcomed any information about the security flaw.

The TAG team has recommended that researchers exercise caution when accepting third-party files and to use separate physical or virtual machines for general browsing and research activities.

Show Full Article
TAGS:Hacking Privacy Breach 
Next Story