Connect with us

Hi, what are you looking for?

Economy

North Korean hackers attacked Gmail accounts

North Korean hackers attacked Gmail accounts

Security researchers have discovered unprecedented malware used to secretly read and download the contents of Gmail and AOL accounts.

North Korean hackers are using unprecedented methods to bypass Google’s email security measures, allowing them to read or download messages and attachments in Gmail accounts without Google noticing. Volexity is a cyber security company According to his blog post Simple browser extensions are used to steal mail data, and sophisticated attacks are said to target users in the United States, Europe and South Korea.

While this type of alleged phishing attack is used to prompt users to actively cooperate by downloading prepared browser extensions, this is no longer necessary in the case of current attacks, as malware can be downloaded onto computers without the victims’ knowledge. What’s even more frightening is that even Google (or Microsoft) browsers don’t detect the intrusion, and the malware itself has been constantly evolving since its discovery, and according to Volexity, it’s already in its third version.

Right now, they don’t care about anyone

The Talk to Ars Technica The company explained that the current iteration of the program, called SHARPEXT, only affects Windows users, but there is no reason to assume that macOS or Linux users will be permanently excluded from this point on. Volexity alleges that the hacker group, referred to as Kimsuky or SharpTongue, operates under the auspices of the North Korean state, and through SHARPEXT monitors individuals working for US, European or South Korean organizations working on issues affecting North Korea’s strategic interests.

See also  Index - Economy - A new head of the Hotel Association has been appointed

Volexity estimates that the extension may have been so successful so far, that attackers have stolen thousands of emails from multiple victims by installing malware, according to records obtained by the security vendor. This is supported by the fact that when SHARPEXT first came out, it was still an immature tool with many bugs, but the latest updates and constant maintenance show that attackers are achieving their goals with it, and it’s worth them to keep improving the code.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Top News

In a harrowing incident that has shaken the community of Lewiston, Maine, a series of shootings on Wednesday evening resulted in a tragic loss...

Top News

President Joe Biden’s abrupt departure from a speech on the U.S. economy at the White House on Monday sent a ripple of speculation and...

Tech

A dangerous application appeared in the Apple App Store disguised as a known program. 24.hu reported the Based on TechCrunch article. Dangerous app in...

World

Chinese scientists have discovered a little-known type of ore containing a rare earth metal highly sought after for its superconducting properties. The ore, called...

Copyright © 2024 Campus Lately.