Wednesday, February 8, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > A North Korea linked backdoor has been used on targets in South Korea

A North Korea linked backdoor has been used on targets in South Korea

Researchers uncovered a new backdoor Dolphin that is linked to a North Korean cyber threat called ScarCruft APT group. Dolphin has been used against targets in South Korea.


Hanife Diktas Hanife Diktas
December 2, 2022
2 min read
A North Korea linked Dolphin has been used on targets in South Korea
  • Researchers from ESET discovered a new backdoor named Dolphin, a previously unreported backdoor used by the ScarCruft APT group.
  • Dolphin is used on selected targets only and searches the drives of compromised systems for interesting files and exfiltrates them to Google Drive.
  • Dolphin was used as the final payload of a combined attack in early 2021, involving a watering-hole attack on a South Korean online newspaper, an Internet Explorer exploits, and another ScarCruft backdoor named Bluelight.

The cyber security team from ESET unveiled a new, sophisticated backdoor called Dolphin while investigating another backdoor known as Bluelight. The research report was published in a blog post to give insights into how newfound backdoor Dolphin performs.

The targets are mainly from South Korea

The ESET cyber security team discovered that the Dolphin backdoor was used by the ScarCruft APT group. This group is also known as APT37 or Reaper. It mainly focuses on victims from South Korea as well as some other Asian countries that also faced attacks from them. The researchers state that Dolphin was used as the final payload of a multistage attack in early 2021 which was involving a watering-hole attack on a South Korean online newspaper, an Internet Explorer exploits with another ScarCruft backdoor named Bluelight. Bluelight previously was reported by Volexity and Kaspersky.

An overview of the attack components leading to the execution of the Dolphin backdoor
An overview of the attack components leading to the execution of the Dolphin backdoor

Dolphin is more sophisticated

ESET researchers say while Bluelight performs basic surveillance on their victims, Dolphin actively digs in the drives of compromised systems for files of interest and exfiltrates them to Google Drive. Other capabilities of Dolphin are including keylogging, taking screenshots, and stealing credentials from browsers. According to analysis, some Dolphin versions can reduce the security of signed-in Gmail accounts most probably to keep its access to victims’ inboxes. For this, the backdoor steals the existing cookie of the logged-in account from the browser and crafts requests modifying the settings. The blog post states;

« Dolphin is a backdoor that collects information and executes commands issued by its operators. The backdoor is a regular Windows executable, written in C++. It communicates with Google Drive cloud storage, which is used as its C&C server. We named the backdoor Dolphin based on a PDB path found in the executable: D:\Development\BACKDOOR\Dolphin\x64\Release\Dolphin.pdb »

The research group has found that Dolphin has improved the backdoor’s capabilities since its initial discovery in April 2021. Currently, Dolphin is capable of collecting current backdoor configuration, username, computer name, local and external IP address, list of installed security products, RAM size and usage, the result of check for debugger and other inspection tools (such as Wireshark), OS version, current time, and malware version. ESET research team adds that Dolphin is another addition to ScarCruft’s extensive arsenal of backdoors that abuses cloud storage services.

See more Cybersecurity News


Tags: ESET
Hanife Diktas

Hanife Diktas

Hanife Diktas is a news editor at Cloud7 News. Hanife started her career in the manufacturing sector in the marketing and sales department. Hanife worked in industrial equipment, renewable energy, and technology sectors. Hanife Diktas did her bachelor's degree in business administration and completed a master's degree in management at Yeditepe University in Istanbul, Turkey. Hanife is a Linux user, and she also contributed to AlmaLinux OS at the beginning of the project. Hanife focuses on web hosting, cloud computing, data centers, cybersecurity, Linux OS, and virtualization technologies. Hanife enjoys creating content and shooting videos covering these topics.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Iceotope and Meta working on immersion cooling on hard drives

Iceotope and Meta working on immersion cooling on hard drives

Related News

New local privilege escalation vulnerability strikes X.Org server

New local privilege escalation vulnerability strikes X.Org server

February 7, 2023 9:45 pm
Red Hat brings new security capabilities to Red Hat OpenShift

Red Hat brings new security capabilities to Red Hat OpenShift

February 7, 2023 8:55 pm
Cisco fixes command injection vulnerability

Cisco fixes command injection vulnerability

February 6, 2023 5:00 pm
Fortra's GoAnywhere managed file transfer is under attack

Fortra’s GoAnywhere managed file transfer is under attack

February 6, 2023 4:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • New local privilege escalation vulnerability strikes X.Org server
  • Red Hat brings new security capabilities to Red Hat OpenShift
  • With BuddyPress 12.0, BP Rewrites will support backward compatibility
  • Dell to lay off 6,650 employees
  • Canonical joins the Academy Software Foundation

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.