DEEP#DRIVE: Major Cyberattack Hits South Korea

DEEP#DRIVE: Massive Cyber Espionage Operation

A large-scale cyberattack, known as DEEP#DRIVE, has been launched against South Korean businesses, government agencies, and cryptocurrency users. This phishing attack has already affected thousands of individuals, with hackers using fake documents to trick victims into downloading harmful software. The attack was first detected in September 2024, and its primary goal appears to be stealing sensitive information from South Korean entities.

Cybersecurity researchers investigating this campaign discovered that hackers are sending phishing emails written in Korean, disguised as important documents such as work logs, insurance files, and cryptocurrency-related reports. These emails contain malicious attachments that, when opened, install malware on the victim’s device.

One example of this deception involved a file disguised as a Telegram.exe application. The document was labeled 대차 및 파레트, which translates to “bogie and pallet” in Korean. It contained details like product name, factory location, and total weight, suggesting that hackers were targeting businesses in the logistics sector.

To make the attack more convincing, hackers used trusted file formats, such as .hwp (a common Korean document format), .xlsx (Excel spreadsheets), and .pptx (PowerPoint presentations). These files were often stored on popular platforms like Dropbox, which helped the hackers avoid detection by traditional security systems. Researchers have confirmed that phishing was the primary method of infection, as the filenames and document themes closely matched common phishing techniques.

How the DEEP#DRIVE Attack Works

The DEEP#DRIVE campaign follows a multi-stage process designed to infect victims’ systems and extract valuable data. The attack typically begins when a user opens a .lnk file, which appears to be a harmless document but is actually a shortcut that executes malicious PowerShell scripts. These scripts allow hackers to gain control over the system and deploy additional harmful software.

Once the attack begins, the PowerShell script performs several key actions:

  • Collecting system details, including the victim’s IP address, operating system version, installed antivirus software, and currently running processes.
  • Downloading additional malicious files, disguised as legitimate applications such as Telegram.exe.
  • Ensuring the malware remains active on the system, by setting up scheduled tasks like ChromeUpdateTaskMachine to run automatically.

Exfiltrating stolen data to the hackers’ Dropbox accounts.

One of the primary tools used in this campaign was a script called “system_first.ps1”, which gathered critical system information and sent it to the hackers. Another script, “temp.ps1”, was responsible for deploying the final malicious payload. While researchers were unable to capture the full details of this payload, they suspect it was a backdoor, allowing hackers to gain persistent access to infected devices.

To avoid detection, the hackers used advanced stealth techniques, including:

  • Using meaningless variable names to make scripts harder to analyze.
  • Adding unnecessary lines of code to create confusion.
  • Manipulating strings in a complex way to prevent easy identification by security tools.

Additionally, once the attack was completed, the hackers deleted their Dropbox links, making it difficult for investigators to trace their activity. This suggests that the attackers had planned the operation carefully and used a temporary attack infrastructure to evade tracking.

Suspected Hackers and Security Measures

The methods and techniques used in the DEEP#DRIVE attack closely resemble past cyber operations carried out by an Advanced Persistent Threat (APT) group known for targeting South Korea. Cybersecurity researchers believe that the same group is behind this attack due to their use of phishing, PowerShell scripts, and Dropbox for data exfiltration.

To protect against similar attacks, cybersecurity experts recommend several important measures. One of the most critical steps is educating users about phishing tactics. Many cyberattacks succeed because people unknowingly click on malicious links or download infected files. Organizations should train employees to identify suspicious emails, avoid clicking on unverified links, and be cautious when downloading attachments.

Another key defense strategy is monitoring malware staging directories. Many attacks involve storing temporary malicious files on a system before executing them. Security teams should regularly check these directories for unusual or unauthorized files that could indicate an ongoing attack. By identifying threats at an early stage, organizations can prevent malware from spreading further.

Lastly, experts emphasize the importance of using strong endpoint logging systems, such as PowerShell logging. Since PowerShell scripts are commonly used in cyberattacks, logging all PowerShell activity can help security teams detect suspicious commands or unauthorized access attempts. This allows organizations to respond quickly and block malicious activities before they cause significant damage.

The DEEP#DRIVE cyberattack highlights the growing risks posed by phishing campaigns and the need for strong cybersecurity measures. With thousands of people already affected, this is one of the most significant cyber threats targeting South Korea in 2024.

TOP 10 TRENDING ON NEWSINTERPRETATION

Google Confirms Dangerous Cyber ‘Espionage’ Attacks on Chrome Users

Google has confirmed a serious cyber threat targeting millions...

Crocodilus: The Malware That Can Empty Your Crypto Wallet in Seconds

A new type of Android malware called Crocodilus has...

Hacker Onslaught Shatters Ethereum Market with 17,000 ETH Dump!

Hackers caused chaos in the crypto world by dumping...

Russian Propaganda Machine Hits White House Press Pool Amidst Heightened Espionage Threat

Russia unknowingly paid a popular right-wing social media influencer...

Chinese Hackers Secretly Breached Asian Telecom Networks for Years Without Being Detected

A new report by cybersecurity firm Sygnia reveals that...

Massive Espionage Blunder Jeopardizes US Spying on Houthis

Leaked text messages between top US officials may have...

BlackLock’s Dirty Secrets Exposed After Researchers “Hack the Hackers”

Cybersecurity researchers hacked into the systems of a ransomware...

APT36 Hackers fakes India Post to Deploy Malware on Windows and Android

Deceptive Website Targets Windows and Android Users In a recent...

DeepSeek Impersonation Ads Infect Users with Malware

Fake DeepSeek Ads Trick Users into a Trap Cybercriminals are...

Solar Power at Risk: Security Flaws Threaten Global Grids

Solar power is growing fast around the world, especially...

Google Confirms Dangerous Cyber ‘Espionage’ Attacks on Chrome Users

Google has confirmed a serious cyber threat targeting millions...

Crocodilus: The Malware That Can Empty Your Crypto Wallet in Seconds

A new type of Android malware called Crocodilus has...

Hacker Onslaught Shatters Ethereum Market with 17,000 ETH Dump!

Hackers caused chaos in the crypto world by dumping...

Russian Propaganda Machine Hits White House Press Pool Amidst Heightened Espionage Threat

Russia unknowingly paid a popular right-wing social media influencer...

Massive Espionage Blunder Jeopardizes US Spying on Houthis

Leaked text messages between top US officials may have...

BlackLock’s Dirty Secrets Exposed After Researchers “Hack the Hackers”

Cybersecurity researchers hacked into the systems of a ransomware...

APT36 Hackers fakes India Post to Deploy Malware on Windows and Android

Deceptive Website Targets Windows and Android Users In a recent...

Related Articles

Popular Categories

error: Content is protected !!