This new Windows malware scans your phone to steal data
Malware also scans for any other removable device
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
Cybersecurity researchers have discovered a newmalwarestrain for Windows that’s capable of stealing sensitive data from any connected device, including mobile phones, and is apparently being used by groups connected to the North Korean government.
Experts from ESET said to have stumbled upon a previously unknown infostealer called Dolphin. Apparently, Dolphin is being used by a threat actor known as APT 37, or Erebus, a group with known ties to the North Korean government. The group, the researchers are saying, has been active for roughly a decade.
Dolphin was first spotted in April 2021, but has since evolved into quite the beast. Nowadays, it is capable of stealing information from webbrowsers(stored passwords, credit card data, etc.), taking screenshots of the infectedendpoints, as well as logging all keystrokes.
Sending everything to Google Drive
The malware gets its commands from aGoogleDrive instance, and sends all the gathered intelligence there as well.
Besides all this, Dolphin also gathers information such as your computer’s name, local and external IP address,security solutions installed on the endpoint, hardware specs andoperating systemversion.
Google says it stopped North Korea hacking Chrome>FBI says North Korean Lazarus group was behind huge crypto theft>Here are the best identity theft protection solutions around
What’s more, it scans all local and removable drives for sensitive data (documents, emails, photos and videos, etc.), as well as smartphones. ESET says this was made possible through the Windows Portable Device API.
So far, four different versions of the malware were spotted in the wild, with the latest, version 3.0, released in January 2022.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
North Korea is relatively active on the cybercrime scene, with a couple of major state-sponsored groups wreaking havoc across the digital world. Perhaps the most infamous example isLazarus Group, which managed to steal some $600 million from cryptocurrency firm Ronin Bridge. Intelligence reports suggest the North Korean government is employing cybercriminal outfits to fund its operations.
Via:BleepingComputer
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
This new phishing strategy utilizes GitHub comments to distribute malware
Should your VPN always be on?
Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics