Keep your eyes on these

VERY IMPORTANT

Security Articles

RSS

Operation Blockbuster Goes Mobile

released on 2017-11-21 @ 12:14:31 AM
Unit 42 has discovered a new cluster of malware samples, which targets Samsung devices and Korean language speakers, with relationships to the malware used in Operation Blockbuster. The specific points of connection between these new samples and Operation Blockbuster include: payloads delivered by the macros discussed in Operation Blockbuster Sequel malware used by the HiddenCobra threat group malware used in the 2016 attack on the Bangladesh SWIFT banking system APK samples hosted on Google Play Although Unit 42 cannot provide a full picture of the details surrounding the delivery of these samples, we are confident this activity targets Korean language speakers who use Samsung devices. Based on this evidence we believe this new malware is likely targeting South Koreans. The newly discovered samples show new capabilities not previously documented. A strong relationship between previously identified malware samples attributed to these campaigns and the newly discovered samples examined in this report.