🕵️ Cyber trap in Seoul: 19 embassies caught in suspected Chinese espionage plot

A major espionage campaign has been uncovered in South Korea, raising alarm in the diplomatic community.

Months-long hacking operation uncovered

Cybersecurity experts revealed that hackers linked to North Korea carried out a months-long operation targeting foreign embassies in Seoul. The hackers disguised their attacks as normal diplomatic communication, making them difficult to detect.

The campaign began in March and is still active. At least 19 embassies and foreign ministries were attacked. Investigators believe the hackers are part of the North Korea-linked group called Kimsuky, also known as APT43. This group has a long history of attacking governments, academics, and media groups around the world.

The timing of the attacks makes this operation more worrying. Researchers found the hackers were active during Chinese working hours. The attacks stopped during Chinese holidays, but not Korean holidays. This suggests the group may be working from China or using Chinese helpers.

Fake diplomatic emails trick victims

The hackers used clever tactics to fool their targets. They sent emails that looked like they came from real diplomats and officials. These emails often contained meeting notes, ambassador letters, or invitations to official events. To make the messages more believable, the emails included official signatures, diplomatic words, and even references to real-world events.

How Cyber Attacks on Industrial Control Systems Can Endanger Lives ?

One phishing email pretended to be an invitation from a U.S. Embassy officer to an Independence Day event. Others copied the style of European diplomats or promoted international forums. To make their attacks harder to spot, the hackers created fake documents in many languages, including Korean, English, Persian, Arabic, French, and Russian.

The email attachments were hidden in password-protected ZIP files. When opened, they released a dangerous malware called XenoRAT. This malware is a type of remote access trojan, also called RAT. It gives hackers full control of the victim’s computer.
The attackers could record keystrokes, see files, turn on webcams, and listen through microphones.

Stolen data routed through global platforms

Once the malware was installed, it collected detailed information from the victim’s device. The stolen data was then secretly sent out using popular online platforms. To avoid being caught, the hackers used trusted services like GitHub, Dropbox, and Google Drive to move data. They even relied on local Korean services such as Daum to store and deliver their malicious files.

This technique made it very hard for security teams to detect the theft, since the attackers were hiding their actions within platforms that many people use daily.

Cyberattack Catastrophe: How Hackers Can Endanger Human Lives ?

The Kimsuky group, which has been active since at least 2012, is well known for using such methods. It has previously targeted organizations across Asia, Europe, Japan, Russia, and the United States. The group has been accused of stealing sensitive information to support North Korea’s foreign policy and efforts to bypass sanctions.

Officials in the past have noted that North Korean cyber units often operate outside their own borders. Many of them are believed to work from countries such as China and Russia. The latest findings add to the evidence that this campaign, though linked to North Korea, may be carried out from Chinese soil or with help from people based there.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

💰 Newsom courts billionaires in $100M redistricting fight — but Trump looms over California’s money race

California Governor Gavin Newsom is pushing ahead with a...

🧑‍💻 Hackers weaponize CAPTCHA — millions lost as Lumma Stealer spreads worldwide

Cybersecurity researchers have raised an alarm about a new...

👶 Google’s $30 million settlement reveals dark side of children’s data on YouTube

Google has agreed to pay $30 million to settle...

26-year-old Yorkshire hacker sentenced for cyberattacks on global organisations and data theft

Yorkshire man sentenced for targeting governments A court jailed a...

Outrage in Brazil: Government Demands Meta Remove Chatbots That ‘Eroticize’ Children

Brazil Takes Action Against Harmful AI Chatbots The Brazilian government...

🕵️ Espionage in silicon: hackers now target chip blueprints with AI-driven backdoors

The world’s most powerful technology, semiconductors, is now caught...

🚨 Data Breach Shock: TPG Telecom Confirms Cyber Incident in iiNet System

Australia’s second-largest internet provider, TPG Telecom, has confirmed it...

Marvel Studio’s Sudden Exit Leaves Georgia’s Film Industry Struggling

For more than a decade, Georgia was known as...

Monero a privacy coin faces 51% attack as mining pool gains control of network power

The crypto world is in shock after Monero, one...

Related Articles

Popular Categories

error: Content is protected !!