Cyber Threat Report: 'North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs'

This cybersecurity advisory from the U.S. Federal Bureau of Investigation (FBI) and its partners, highlights the cyber espionage activities of the Democratic People’s Republic of Korea (DPRK)’s Reconnaissance General Bureau (RGB) 3rd Bureau. The advisory focuses on a state-sponsored cyber group known as Andariel, which targets defense, aerospace, nuclear, and engineering entities to obtain sensitive and classified technical information. The group has been observed funding its espionage activities through ransomware operations including against U.S. healthcare entities. The advisory outlines the group's methods, including exploiting known software vulnerabilities, using phishing techniques, and deploying custom malware implants and remote access tools. The advisory emphasizes the importance of critical infrastructure organizations applying timely patches for vulnerabilities, protecting web servers from web shells, monitoring endpoints for malicious activities, and strengthening authentication and remote access protections. It provides specific recommendations for mitigating risks, such as deploying endpoint agents, blocking unnecessary outbound connections, and segmenting networks to prevent lateral movement from compromised web servers. Finally, the advisory includes detailed technical information on the MITRE ATT&CK tactics, techniques, and procedures (TTPs) used by Andariel and associated indicators of compromise (IoCs).

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1560 Archive Collected Data Collection
T1587.001 Malware Resource Development
T1048 Exfiltration Over Alternative Protocol Exfiltration
T1021 Remote Services Lateral Movement
T1587.004 Exploits Resource Development
T1083 File and Directory Discovery Discovery
T1021.002 SMB/Windows Admin Shares Lateral Movement
T1071 Application Layer Protocol Command and Control
T1591 Gather Victim Org Information Reconnaissance
T1003 OS Credential Dumping Credential Access
T1572 Protocol Tunneling Command and Control
T1190 Exploit Public-Facing Application Initial Access
T1567 Exfiltration Over Web Service Exfiltration
T1027 Obfuscated Files or Information Defense Evasion
T1090 Proxy Command and Control
T1592 Gather Victim Host Information Reconnaissance
T1087 Account Discovery Discovery
T1059 Command and Scripting Interpreter Execution
T1596 Search Open Technical Databases Reconnaissance
T1039 Data from Network Shared Drive Collection
T1595 Active Scanning Reconnaissance