Description

Microsoft has revealed that North Korea-linked state-sponsored cyber actors are incorporating artificial intelligence (AI) into their operations to enhance efficiency and effectiveness. The tech giant's latest report on East Asia hacking groups highlights the use of AI-powered large language models (LLMs) by a group known as Emerald Sleet (aka Kimusky or TA427). Emerald Sleet has been observed using LLMs to improve spear-phishing efforts targeting Korean Peninsula experts. Additionally, the group has utilized AI advancements for vulnerability research, reconnaissance on organizations and experts focused on North Korea, and troubleshooting technical issues. Microsoft collaborated with OpenAI to disable accounts and assets associated with this threat actor. Proofpoint, an enterprise security firm, reported that Emerald Sleet engages in benign conversation starter campaigns to establish contact with targets for long-term exchanges of information on topics important to the North Korean regime. The group leverages think tank and non-governmental organization-related personas to legitimize its emails and increase the attack's success rate. Recently, Emerald Sleet has abused lax Domain-based Message Authentication, Reporting, and Conformance (DMARC) policies to spoof various personas and incorporate web beacons (tracking pixels) for target profiling. North Korean hacking groups continue to engage in cryptocurrency heists and supply chain attacks. Jade Sleet, a threat actor linked to these activities, has been involved in stealing millions of dollars from cryptocurrency platforms. Another group, Diamond Sleet (aka Lazarus Group), compromised a Germany-based IT company in August 2023 and conducted a supply chain attack using an application from a Taiwan-based IT firm in November 2023. These activities generate revenue for North Korea's weapons program and collect intelligence on the United States, South Korea, and Japan. Diamond Sleet is known for employing sophisticated methods like Windows Phantom DLL Hijacking and Transparency, Consent, and Control (TCC) database manipulation to deploy malware and undermine security protections.