Today > 2 Critical | 3 High | 25 Medium vulnerabilities   -   You can now download lists of IOCs here!

Kimsuky Deploys TRANSLATEXT Chrome Extension

June 28, 2024, 7:58 a.m.

Description

In March 2024, the cybersecurity firm Zscaler observed a new activity from Kimsuky, a North Korean state-sponsored hacker group. They employed a malicious Google Chrome extension named 'TRANSLATEXT' specifically crafted to steal email addresses, usernames, passwords, cookies, and capture browser screenshots. The primary targets appear to be academic researchers in South Korea specializing in geopolitical issues related to the Korean peninsula. The extension bypassed security measures of prominent email providers and exfiltrated stolen data via a GitHub repository controlled by the threat actors.

Date

Published: June 28, 2024, 7:46 a.m.

Created: June 28, 2024, 7:46 a.m.

Modified: June 28, 2024, 7:58 a.m.

Indicators

https://webman.w3school.cloudns.nz/config.php

https://webman.w3school.cloudns.nz

http://viaweb.co.kr

http://sdfa.liveblog365.com/ares/hades.txt

http://sdfa.liveblog365.com/ares/babyhades.txt

http://ney.r-e.kr/mar/tys.txt

http://ney.r-e.kr/mar/tys.php

webman.w3school.cloudns.nz

ney.r-e.kr

sdfa.liveblog365.com

Attack Patterns

TRANSLATEXT

Kimsuky

T1102.001

T1555.003

T1059.001

T1113

T1071.001

T1176

T1041

Additional Informations

Education