Google uncovers North Korea espionage campaign

485

Google has blamed a North Korean group for posing as security bloggers and launching espionage campaign on American Cybersecurity Community. The attacks were discovered when Google’s Threat Analysis Group discovered some hackers were trying to steal classical data by creating fake social media accounts on Facebook and Twitter.

Such attacks can be serious says Adam Weidemann, a senior researcher at the Alphabet subsidiary’s as the stolen info can breach popular computer products such as Windows 10 operating system and Chrome Web Browser.

The highlight of the specified attack is that some security researchers are posing as beautiful females and inviting some high-profile people from big companies to view their Instagram accounts filled with flamboyant photos. They somehow trap such people into revealing the vulnerabilities of certain software products, thus giving them access to a business network respectively to install snooping malware.

Currently, there is no information on the number of compromised products or devices. But Weidemann has welcomed other security researchers from across the world to share information, if any.

However, the threat analysis group owned by the internet juggernaut has tracked down 10 twitter profiles and 7 LinkedIn profiles indulging in such malevolent activities.

Like in previous instances, North Korea has denied its involvement in such attacks. But the entire world knows how the country earns its finances by indulging in malicious online activities.

Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security