North Korean hackers target Ukrainian government in new espionage campaign
朝鲜支持的黑客组织TA406针对乌克兰政府机构发起网络间谍活动,通过鱼叉式网络钓鱼攻击伪装智库成员发送恶意邮件,收集情报以评估俄乌冲突进展及风险。 2025-5-13 12:2:57 Author: therecord.media(查看原文) 阅读量:9 收藏

North Korean state-backed hackers have targeted Ukrainian government entities in a new espionage campaign, likely aimed at gathering intelligence on Russia’s war efforts, researchers have found.

The group, tracked as TA406, is known for using spear-phishing attacks to target governments, research centers, think tanks, academic institutions and media organizations worldwide — particularly in Europe, Japan, Russia, South Korea and the United States.

Previously, the group focused on collecting strategic intelligence in Russia. The latest wave of activity in Ukraine suggests that Pyongyang is seeking to “better understand the appetite to continue fighting against the Russian invasion” and “the medium-term outlook of the conflict,” according to the latest report by cybersecurity firm Proofpoint.

North Korea, which started deploying troops to assist Russian forces in Ukraine in late 2024, is likely using this intelligence to assess risks to its own forces on the ground and to gauge whether Moscow will require further military support, researchers said.

TA406, also tracked under the names Opal Sleet and Konni, has used a variety of techniques in its recent campaigns in Ukraine, including impersonating think tank members to trick victims into opening phishing emails related to recent events in Ukrainian domestic politics.

During one operation in February 2025, the group spoofed a fictitious senior fellow from the Royal Institute of Strategic Studies — another fabricated entity. The phishing emails contained a link to a file hosted on a cloud storage service, which would download a password-protected archive.

If decrypted and executed, the archive would initiate a chain of infections using PowerShell, allowing the attackers to collect data on the target computer, including IP configuration, file names, disk information and installed antivirus software.

TA406 had previously attempted to harvest credentials from Ukrainian government employees by sending fake Microsoft security alert messages via Protonmail accounts. These emails warned of unusual sign-in activity and prompted recipients to verify their login attempts. While the credential harvesting page could not be recovered, the tactics align with TA406’s known activity.

Ukrainian researchers rarely speak of North Korean cyberattacks on their systems — most espionage campaigns against the country are attributed to Russian hackers. As of the time of writing, Ukraine’s computer emergency response team (CERT-UA) has not responded to a request for comment from Recorded Future News regarding TA406’s latest campaign.

According to Proofpoint, TA406’s cyber efforts in Ukraine are focused on political intelligence and strategic analysis of the ongoing war. This contrasts with the objectives of Russian hackers, who typically seek tactical intelligence related to battlefield operations.

Earlier in February, the European Union sanctioned the head of North Korea’s Reconnaissance General Bureau (RGB), Lee Chang Ho, who was allegedly involved in deploying North Korean personnel to support Russia’s war against Ukraine. He has also overseen cyber units, including those known in the West as Lazarus and Kimsuky.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/north-korea-hackers-target-ukraine-to-understand-russian-war-efforts
如有侵权请联系:admin#unsafe.sh