Google Blames North Korean Hackers For Stealing Secrets From Cyber Researchers
Google has blamed North Korea-backed hackers for attempting to steal information through espionage online. The hackers have been posing as computer security bloggers and have been using fake social media accounts to carry out their attacks. Experts at Google say the cyber attacks conducted in this manner reflect North Korean hackers intent to improve their cyber skills across platforms.
In a new revelation, Google has blamed North Korea-backed hackers for attempting to steal information through espionage online.
The company says that the hackers have been posing as computer security bloggers and have been using fake social media accounts to carry out their attacks.
Experts at Google say the cyber attacks conducted in this manner reflect North Korean hackers¡¯ intent to improve their cyber skills across platforms. With repeated such attacks, the hackers will eventually be able to breach popular computer products, including Google Chrome web browser and Microsoft Windows 10 operating system.
Google didn¡¯t provide any information on how successful the hackers were in their notorious attempts. Google did not even specify the vulnerable information which could have been compromised through these attacks.
The attempts have come to light through a new online report published by Google on Monday. Adam Weidemann, a researcher at Google¡¯s Threat Analysis Group, said in the report that hackers targeted security researchers in attempts to interact with them on social media platforms. To develop the credibility for this, these hackers created fake research blog and multiple Twitter profiles.
After connecting with the targeted researchers, the hackers would extend the opportunity to collaborate on cyber-vulnerability research with them. In doing so, they would share a tool with them that contained a code to install malicious software on the targets¡¯ computers. Once installed, the software would allow the hackers to control the device and steal information from it.
As per Weidemann, several targeted researchers became victims to the attack after they followed a Twitter link to a blog set up by the hackers. ¡°At the time of these visits, the victim systems were running fully patched and up-to-date Windows 10 and Chrome browser versions,¡± Weidemann wrote. ¡°At this time we¡¯re unable to confirm the mechanism of compromise, but we welcome any information others might have.¡±
Since the attempts have come to light, Google has been able to find out several social media accounts and websites linked to these cyber attacks. The list includes 10 Twitter profiles and five LinkedIn profiles as of now.
From the attacks, it can be understood that the attempts were made at stealing the already discovered vulnerabilities of various platforms, including operating systems like Windows 10. Attempting to breach the security protocols of these platforms from scratch is a lot harder than simply stealing the already known loopholes from others.
North Korea has denied any involvement in these cyber attacks as of now. Though the country has historically been involved in such malicious attempts online and reportedly generates a significant amount of untraceable money through these.
(With inputs from AP)