Cybersecurity NewsNews

North Korean Hackers Steals Identity of a South Korean Officer

Loading

A cybercrime incident in South Korea is recently traced to North Korea for stealing and impersonating a police officer’s identity.

It is affirmed announced by a cybersecurity firm ESTsecurity on tactics North Korea used to disguise as an inspecting officer from a security team of a South Korean police department. The report revealed the effect of this cyberattack on the security department.

How the Hackers Got the Information 

Threat actors deploy attacks consequently to deploy a PDF file including an official ID card, name, designation, and passport.  One of the most popular cyber attacks occurred in a General Bureau whereby hackers gather vital information from their target.

ERSCs have discovered the high rate of IDs stolen by hackers for their beneficial gain, thus leading to cybersecurity risk in North Korea.

Although cybercrime cannot be erased, it is however advised to enable security measures and trust no one. The first step of a hacker is to build trust from victims to get confidential information about them.

Zero cybersecurity model for users to trust no one, applications, or other devices unless they have passed all forms of authentication and verification.

Compromised Identity

The officer whose ID was compromised sent an email to victims of the cyber attack last month. The contents of this email reveal how the officer explained to an employee of Unification Media Group. This email is analyzed to confirm that the proper authentication of the officer is valid.

The ID file was accessed through another recipient of a police cooperation request who had already been hacked. The hacker appears to have acquired the ID card file and other materials from a computer he already controlled, using them in the latest attack.

About these cyber crimes, individuals who have sent or exchanged emails with the officers need to be cautious because they are liable to attack. Security solutions is enforced in all organizations to reduce the vulnerability of database software.

 

Related Articles

Back to top button