DEEP#DRIVE: Major Cyberattack Hits South Korea

DEEP#DRIVE: Massive Cyber Espionage Operation

A large-scale cyberattack, known as DEEP#DRIVE, has been launched against South Korean businesses, government agencies, and cryptocurrency users. This phishing attack has already affected thousands of individuals, with hackers using fake documents to trick victims into downloading harmful software. The attack was first detected in September 2024, and its primary goal appears to be stealing sensitive information from South Korean entities.

Cybersecurity researchers investigating this campaign discovered that hackers are sending phishing emails written in Korean, disguised as important documents such as work logs, insurance files, and cryptocurrency-related reports. These emails contain malicious attachments that, when opened, install malware on the victim’s device.

One example of this deception involved a file disguised as a Telegram.exe application. The document was labeled 대차 및 파레트, which translates to “bogie and pallet” in Korean. It contained details like product name, factory location, and total weight, suggesting that hackers were targeting businesses in the logistics sector.

To make the attack more convincing, hackers used trusted file formats, such as .hwp (a common Korean document format), .xlsx (Excel spreadsheets), and .pptx (PowerPoint presentations). These files were often stored on popular platforms like Dropbox, which helped the hackers avoid detection by traditional security systems. Researchers have confirmed that phishing was the primary method of infection, as the filenames and document themes closely matched common phishing techniques.

How the DEEP#DRIVE Attack Works

The DEEP#DRIVE campaign follows a multi-stage process designed to infect victims’ systems and extract valuable data. The attack typically begins when a user opens a .lnk file, which appears to be a harmless document but is actually a shortcut that executes malicious PowerShell scripts. These scripts allow hackers to gain control over the system and deploy additional harmful software.

Once the attack begins, the PowerShell script performs several key actions:

  • Collecting system details, including the victim’s IP address, operating system version, installed antivirus software, and currently running processes.
  • Downloading additional malicious files, disguised as legitimate applications such as Telegram.exe.
  • Ensuring the malware remains active on the system, by setting up scheduled tasks like ChromeUpdateTaskMachine to run automatically.

Exfiltrating stolen data to the hackers’ Dropbox accounts.

One of the primary tools used in this campaign was a script called “system_first.ps1”, which gathered critical system information and sent it to the hackers. Another script, “temp.ps1”, was responsible for deploying the final malicious payload. While researchers were unable to capture the full details of this payload, they suspect it was a backdoor, allowing hackers to gain persistent access to infected devices.

To avoid detection, the hackers used advanced stealth techniques, including:

  • Using meaningless variable names to make scripts harder to analyze.
  • Adding unnecessary lines of code to create confusion.
  • Manipulating strings in a complex way to prevent easy identification by security tools.

Additionally, once the attack was completed, the hackers deleted their Dropbox links, making it difficult for investigators to trace their activity. This suggests that the attackers had planned the operation carefully and used a temporary attack infrastructure to evade tracking.

Suspected Hackers and Security Measures

The methods and techniques used in the DEEP#DRIVE attack closely resemble past cyber operations carried out by an Advanced Persistent Threat (APT) group known for targeting South Korea. Cybersecurity researchers believe that the same group is behind this attack due to their use of phishing, PowerShell scripts, and Dropbox for data exfiltration.

To protect against similar attacks, cybersecurity experts recommend several important measures. One of the most critical steps is educating users about phishing tactics. Many cyberattacks succeed because people unknowingly click on malicious links or download infected files. Organizations should train employees to identify suspicious emails, avoid clicking on unverified links, and be cautious when downloading attachments.

Another key defense strategy is monitoring malware staging directories. Many attacks involve storing temporary malicious files on a system before executing them. Security teams should regularly check these directories for unusual or unauthorized files that could indicate an ongoing attack. By identifying threats at an early stage, organizations can prevent malware from spreading further.

Lastly, experts emphasize the importance of using strong endpoint logging systems, such as PowerShell logging. Since PowerShell scripts are commonly used in cyberattacks, logging all PowerShell activity can help security teams detect suspicious commands or unauthorized access attempts. This allows organizations to respond quickly and block malicious activities before they cause significant damage.

The DEEP#DRIVE cyberattack highlights the growing risks posed by phishing campaigns and the need for strong cybersecurity measures. With thousands of people already affected, this is one of the most significant cyber threats targeting South Korea in 2024.

TOP 10 TRENDING ON NEWSINTERPRETATION

Remote jobs exploited in global scheme as Amazon halts 1,800 North Korea-linked applications

Amazon has recently blocked more than 1,800 job applications...

Romania hit by ransomware attack as 1,000 government computers taken offline in water authority breach

Romania’s water management authority has been hit by a...

“Democracy under siege”: Sanders warns Meta and Big Tech are buying U.S. elections to block AI rules

U.S. Senator Bernie Sanders has issued a strong warning...

AI Didn’t Kill Jobs — It Quietly Made Them More Valuable

Workers around the world have been worried about artificial...

Redacted Epstein files trigger backlash as AOC names DOJ and demands accountability

Representative Alexandria Ocasio-Cortez (AOC) triggered widespread attention after posting...

House committee releases photos from Jeffrey Epstein estate with candid and unsettling content

New photos have emerged from the estate of Jeffrey...

Kamala Harris responds to criticism over Biden’s handling of Epstein-related documents

The controversy surrounding documents linked to disgraced sex trafficker...

Julian Assange challenges Nobel Peace Prize award, seeks to block payment to Venezuelan opposition leader

WikiLeaks founder Julian Assange has filed a complaint against...

“This is a huge red flag”: AOC says Trump used force against cartels without sharing intelligence with Congress

The debate in Washington has intensified after strong criticism...

Food Giants Call It “Efficiency” — Workers Call It Tens of Thousands of Layoffs

The food and beverage industry experienced a very difficult...

AI Didn’t Kill Jobs — It Quietly Made Them More Valuable

Workers around the world have been worried about artificial...

Redacted Epstein files trigger backlash as AOC names DOJ and demands accountability

Representative Alexandria Ocasio-Cortez (AOC) triggered widespread attention after posting...

Kamala Harris responds to criticism over Biden’s handling of Epstein-related documents

The controversy surrounding documents linked to disgraced sex trafficker...

Related Articles

Popular Categories

error: Content is protected !!