We (@interlab_kr) have been tracking a threat actor we classify as UCID902. This actor is utilising watering hole credential harvesting attacks to target activists related to the advocacy of human rights in the Korea peninsular.
We first observed UCID902 in 2021 when working with activists based in SK and with lures aimed to appear as Naver security alerts, prompting users to input credentials. We found that typical infrastructure was set up on legitimate web development organisations web servers.
Over the last 2 years, we have seen consistent efforts to target individuals from the human rights and civil society communities.
All events we have tracked, show direct correlations between both infrastructure, capabilities and victimology. All attacks utilise a compromise of a legitimate web development company; all of which are based in Seoul.
In 2022, we identified a very specific infrastructure overlap between UCID902 and a campaign lead by #Kimsuky, involving malicious HWP documents targeting The Ministry of Unification (@uni_kr).
For us, this indicated the first socio-political axis of UCID902 within our data, by closely overlapping with motivations by known threat groups based in NK.
We notified KISA (@kisa118) of the compromised web development companies earlier this year and have yet to hear if these companies have been secured. Once we know they have been, we will release IOCs to help defend those at risk.
@hypen1117 Hey Hypen. Thanks kindly for your message. Great to have civil discussion on it! Like I said, I don’t think it really matters. I value your teams research more than this matter, you have done a great thing to society by finding differing versions of RambleOn 1/
@hypen1117 Our analysis was a finding of novel malware that was impacting journalists at that present moment. We found RambleOn then imminently went to work on working with big tech to implement detections and mitigations for it, to better defend society and those at risk 2/
@hypen1117 We didn’t intent to perform a retro hunt at that time, we haven’t the resources for that. So, at that time, we hadn’t had scope of previous versions or correlation with other samples. Your teams research did this, which is amazing and an honorary effort to society 3/
Last month @S2W_Official published additional research on #RambleOn, finding other variants of it and highlighting code similarities between a 2017 campaign operated by #APT37 which used a Android variant of #Rokrat Malware
2/6
Note: @S2W_Official Renamed RambleOn malware to Culumus. Reasons for which are unknown.
3/6