APT

North Korea-linked APT BlueNoroff focuses on crypto theft

The North Korea-linked APT group BlueNoroff has been spotted targeting cryptocurrency startups with fake MetaMask browser extensions.

The North Korea-linked APT group BlueNoroff has been spotted targeting cryptocurrency startups with fake MetaMask browser extensions. The nation-state actor is considered a group that operates under the control of the notorious North Korea-linked Lazarus APT group.

The latest string of attacks targeted cryptocurrency startups in the US, Russia, China, India, the UK, Ukraine, Poland, Czech Republic, UAE, Singapore, Estonia, Vietnam, Malta, Germany, and Hong Kong.

BlueNoroff shifted focus from attacks against the banks and SWIFT-connected servers to cryptocurrency businesses, the researchers also spotted the attackers building fake cryptocurrency software development companies in order to trick victims into installing legitimate-looking applications that eventually receive trojanized updates

Kaspersky published a report that details the recent operations conducted by the APT group since November 2021.

BlueNoroff attempts to get in contact with specific people in target organizations that are identified through precise reconnaissance.

In an attack scenario described by Kaspersky, the attackers sent to the victims a notification of a shared document via Google Drive from one colleague/friend to another.

The attackers in some attacks compromised the LinkedIn account of an employee within an organization and used it to share the link to a weaponized document on the platform.

The APT group used a tiny “X” image to track their campaigns, they used the third-party tracking service (Sendgrid) to be notified when the victim opens the sent document.

Kaspersky shared a list of company names that have been impersonated by the attackers, such as CoinSquad, CoinBig, Anri, and Abies Ventures. The researchers are not aware of the compromise of these companies.

The analysis of the bait documents used in the attacks revealed that threat actors exploited a remote template injection vulnerability tracked as CVE-2017-0199.

Another attack chain used by the APT group relies on sending an archive that contains a password-protected document (Excel, Word, or PDF) and a shortcut file disguised as a text file containing the document’s password.c

The multi-stage infection process ends with the released of a backdoor that supports the following functionalities:

  • Directory/File manipulation
  • Process manipulation
  • Registry manipulation
  • Executing commands
  • Updating configuration
  • Stealing stored data from Chrome, Putty, and WinSCP

The attackers used the malware BlueNoroff to steal user credentials make lateral movement and compromise the larger number of systems as possible in the victim’s network. In some cases, the attackers carefully monitored for weeks the user and data flow within the target network, while planning a strategy for financial theft, especially for prominent prominent targets.

“If the attackers realize that the target uses a popular browser extension to manage crypto wallets (such as the Metamask extension), they change the extension source from Web Store to local storage and replace the core extension component (backgorund.js) with a tampered version. At first, they are interested in monitoring transactions.” reads the analysis published by Kaspersky.

Kaspersky highlighted that the high skills of BlueNoroff group that was able to tamper with the Metamask Chrome extension by analyzing 170,000 lines of code.

The only was to discover that the the extension is fake is analyze the extension source in debugging mode and discover that it is pointing to a local directory rather than the online store.

In the attacks against hardware wallets, the threat actors hijack the transactions by changing the recipient’s address, attempting to steal the maximum amount available.

The attribution to the North Korea-linked APT is based on overlaps and similarities between PowerShell scripts and backdoors used in past campaigns.

Experts also found similarities in the C2 address acquisition process with 2016 attacks that use a hardcoded DWORD value to resolve an IP address via XORing.

The report includes the Indicators of Compromise (IoCs) for this attack.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, BlueNoroff APT)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

19 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

24 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.