Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 3, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 3, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 3, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 3, 2025

      SteelSeries reveals new Arctis Nova 3 Wireless headset series for Xbox, PlayStation, Nintendo Switch, and PC

      June 3, 2025

      The Witcher 4 looks absolutely amazing in UE5 technical presentation at State of Unreal 2025

      June 3, 2025

      Razer’s having another go at making it so you never have to charge your wireless gaming mouse, and this time it might have nailed it

      June 3, 2025

      Alienware’s rumored laptop could be the first to feature NVIDIA’s revolutionary Arm-based APU

      June 3, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      easy-live2d – About Make your Live2D as easy to control as a pixi sprite! Live2D Web SDK based on Pixi.js.

      June 3, 2025
      Recent

      easy-live2d – About Make your Live2D as easy to control as a pixi sprite! Live2D Web SDK based on Pixi.js.

      June 3, 2025

      From Kitchen To Conversion

      June 3, 2025

      Perficient Included in Forrester’s AI Technical Services Landscape, Q2 2025

      June 3, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      SteelSeries reveals new Arctis Nova 3 Wireless headset series for Xbox, PlayStation, Nintendo Switch, and PC

      June 3, 2025
      Recent

      SteelSeries reveals new Arctis Nova 3 Wireless headset series for Xbox, PlayStation, Nintendo Switch, and PC

      June 3, 2025

      The Witcher 4 looks absolutely amazing in UE5 technical presentation at State of Unreal 2025

      June 3, 2025

      Razer’s having another go at making it so you never have to charge your wireless gaming mouse, and this time it might have nailed it

      June 3, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»North Korean Hackers Targeted Nearly 18,000 in Phishing Campaign During Martial Law Turmoil

    North Korean Hackers Targeted Nearly 18,000 in Phishing Campaign During Martial Law Turmoil

    April 16, 2025

    North Korea, South Korea, DPRK, Phishing, Martial Law

    North Korean hackers sent more than 120,000 phishing emails to nearly 18,000 individuals over a three-month campaign that impersonated South Korea’s Military Counterintelligence Command’s communication during the Martial Law turmoil, the National Police Agency said Wednesday.

    The campaign began in November 2024 and continued through January 2025, targeting professionals in the unification, defense, national security, and foreign affairs sectors. Police confirmed North Korea’s involvement through forensic analysis of the phishing infrastructure, IP addresses, and language patterns tied to past operations.

    “Our investigation has confirmed that North Korea was behind the emails distributed on Dec. 11, 2024, bearing the subject line, ‘Disclosure of Defense Counterintelligence Command Martial Law Documents,’” Kim Young-woon, head of the agency’s cyber terrorism unit, said during the press briefing. “Historically, North Korea would send hand-crafted emails impersonating analysts or experts, offering geopolitical forecasts or New Year’s speech analyses,” Kim said. “Now, they’ve automated the process, enabling mass distribution.”

    Authorities said at least 570 individuals clicked on the phishing bait and likely exposed sensitive data, including emails and contact lists.

    Recycled Infrastructure and Targeted Deception

    The hackers used 15 overseas servers rented through foreign providers and deployed custom-built malware capable of tracking real-time metrics. Investigators said the malware that looked to be an info-stealer monitored whether emails were opened, if users clicked on embedded links, and whether they submitted account credentials.

    North Korea reused servers previously identified in earlier state-backed cyberattacks. The infrastructure also showed evidence of searches for North Korean defector data and South Korean military information. Browser logs included North Korean dialects, strengthening attribution.

    Each phishing email mimicked government alerts or official communication. Subject lines included fake military documents, New Year’s policy analyses, and even invitations to concerts by South Korean celebrities. Others posed as tax refunds, horoscope readings, or health advisories.

    Deceptive Links Spread Under the Guise of Martial Law Deployment

    The emails directed users to spoofed login portals that closely resembled major South Korean web services like Naver, Kakao, and even Google. Domains included subtle misspellings or character swaps—such as googlauth.com, naver-auth.com, or baernin.com.

    Many email addresses appeared to come from government domains or closely resembled personal contacts. Spoofing methods included:

    • Adding terms like -news, -noreply, or -report to legitimate domains.

    • Mimicking friends’ or colleagues’ addresses with subtle variations (e.g., adding a single letter).

    • Using lookalike domain names with common misspellings (m as rn, or co.kr altered to co.kro.kr).

    Out of the 17,744 recipients, 120 individuals fell for the phishing attempt, entering their credentials and granting attackers access to inbox contents and stored contact information.

    Warnings to the Public

    The South Korean government urged the public to remain vigilant against phishing threats, especially those disguised as official communication. Authorities advised against opening unfamiliar emails, clicking suspicious links, or downloading unverified attachments.

    “Never input your ID or password without verifying the legitimacy of the request,” the police warned. “Look carefully at the email sender and website domain. Even minor differences can signal fraud.”

    Officials also recommended regularly reviewing account login histories and enabling multi-factor authentication wherever possible.

    A Coordinated, Persistent Threat

    The investigation showed that the phishing campaign was both well-organized and sustained, reflecting a broader pattern in North Korea’s cyber playbook. Previous incidents linked to Pyongyang include attacks on cryptocurrency platforms, espionage efforts targeting defense sectors, and global disinformation operations.

    South Korean authorities reiterated their readiness to respond decisively to any form of cyber aggression. The police pledged enhanced coordination with international partners and local cybersecurity agencies.

    “We are mobilizing our full law enforcement capability,” the Police chief said. “Cyberthreats, especially those linked to hostile nations, will be met with swift and strong responses.”

    Public Disclosure Justified

    Under South Korea’s Public Information Rules on Criminal Investigations, the case was disclosed to the media to help prevent similar attacks. The government cited two justifications:

    • The need to prevent recurrence by informing the public of phishing tactics.

    • The importance of limiting the spread of harm by raising awareness.

    This disclosure falls in line with past efforts to inform citizens of advanced cyber threats, particularly those involving national security and public institutions.

    Ongoing Investigations

    The investigation remains open as cybersecurity experts continue tracking North Korea’s infrastructure and tactics. South Korea’s Cyber Terror Response Division is working closely with the Korea Internet & Security Agency (KISA) and other international stakeholders.

    Police urged anyone who suspects they received a spoofed message to report it immediately to national authorities and avoid interacting with the email in any way.

    “Cybersecurity is a collective effort,” said the Police said. “Every report helps us build a stronger defense against these malicious campaigns.”

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleFrom Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains
    Next Article New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks

    Related Posts

    Security

    Alert: Malicious RubyGems Impersonate Fastlane Plugins, Steal CI/CD Data

    June 3, 2025
    Security

    Critical CVSS 9.6: IBM QRadar & Cloud Pak Security Flaws Exposed

    June 3, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    This AI Paper by Narrative BI Introduces a Hybrid Approach to Business Data Analysis with LLMs and Rule-Based Systems

    Development

    British teen arrested in connection with MGM Resorts ransomware attack

    Development

    How to Use Celery in Django

    Development

    Reinforcement Learning Makes LLMs Search-Savvy: Ant Group Researchers Introduce SEM to Optimize Tool Usage and Reasoning Efficiency

    Machine Learning

    Highlights

    News & Updates

    Xbox fans are pining for Microsoft to re-open backward compatibility, considering it previously said it would add “as many games as possible” from Activision’s catalog

    March 18, 2025

    Microsoft acquired Activision-Blizzard in full in 2023, and as we enter the second year of…

    How GitHub reduced testing time for iOS apps with new runner features

    June 3, 2024

    Hardware Inventory Policy

    February 26, 2025
    Microsoft Patch Tuesday April 2025: One Zero-Day, 11 High-Risk Flaws

    Microsoft Patch Tuesday April 2025: One Zero-Day, 11 High-Risk Flaws

    April 8, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.