DPRK IT workers "engage in a wide range of IT dev work, such as: mobile & web-based apps, virtual currency exchange platforms & digital coins. Some
designed virtual currency exchanges or created analytic tools/apps for virtual currency traders & marketed their products." (2/?)
Onto fake job applicant TTPs: "DPRK IT teams abroad most commonly obtain freelance jobs through various online platforms. They build “portfolio” websites, generally simple in design, in an effort to boost the
credibility of their fabricated, freelance developer personas." (4/?)
The recruitment theme is VERY strong with DPRK threat activity: on one hand, posing as job applicants in order to act as insider threats, as per above & this awesome paper on #DPRK#cybercrime, its purposes, statecraft and #threatintel: belfercenter.org/sites/default/… (5/?)
Another #threatintel angle: campaigns trying to lure companies (typically cryptocurrency startups) by using business proposals/VC pitches that seem too good to be true. Examples again re #DangerousPassword/#SnatchCrypto:
Returning to DPRK IT workers & fake profiles, these points stood out: purchase of details from 3rd party/hiring 3rd party as proxy; using stolen documents & bank details to set up personas; use of work bidding platforms; simplistic portfolios; refusing video calls. (8/?)
Note: "Although DPRK IT workers normally engage in IT work distinct from malicious cyber activity, they have used the privileged access as contractors to enable DPRK malicious cyber intrusions. There are likely instances where workers are subjected to forced labor." (9/?)
LOTS to unpack: DPRK IT workers != DPRK APTs, but 1) in some cases DPRK IT workers will "enable DPRK malicious cyber intrusions". (Access handoff? Backdooring? Want to research this more👀) 2) DPRK APTs posing as either job applicants or as job recruiters. (10/?) #threatintel
One more aspect warranting further investigation: "instances in which DPRK IT teams appear, on paper, to work for a legitimate local company but pursue their own business independently – and in return will pay a fee to the foreign company". @intrusion_truth on #DPRK when? (11?)
Final element: WHY? Ultimately, "to generate revenue" for the regime. Many can discuss the security and policy implications. But what about #humanrights? @USTreasury notes forced labor: constant surveillance, unsafe conditions, little freedom of movement, 10% pay kept. (13/?)
I do #threatintel to help build a secure digital society for all, to undermine cyber ops that do harm. Controv, but I'd invite us all to be mindful of the #humanrights context of adversaries in some cases, like DPRK IT workers, & whether & how that could be helped. (14/14)
• • •
Missing some Tweet in this thread? You can try to
force a refresh
ICYMI, @PwC_UK’s 2020 #threatintel Year in Retrospect report is out now! All team contributed but h/t to @KystleM_Reid! :fire: You can check it out here: pwc.to/2ZPx7fo In this thread, I will summarise some of what I thought were key findings: 🧵👇 1/n
#Ransomware has become the most significant cyber security threat faced by organisations, irrespective of industry/location. TTPs have pivoted to mass data exfiltration prior to encryption, along with leaks & extortion. S/o to @andyp346 for all your work countering this.🙏 2/n
In 2020, 86% of the incidents that PwC’s Incident Response team responded to were attributable to cyber criminals. 79% of leaks happened in 2nd half of 2020. Our data sees Manufacturing, TMT, & Professional Services most impacted. 3/n