SentinelLabs analyzed leaked emails and associated implants to confirm two North Korea-backed hacker groups intruded into a Russian missile maker. Credit: Ed Brambley / Gerd Altmann Two North Korean hacker groups had access to the internal systems of a Russian missile and satellite developer NPO Mashinostoyeniya for five to six months in 2022, according to research by cybersecurity firm SentinelOne. Two separate instances of North Korea-related compromises were identified by SentinelLabs -- the threat intelligence and malware analysis arm of SentinelOne -- giving access to sensitive internal IT infrastructure within this same Russian defense industrial base (DIB) organization. The compromises included one in the DIB's specific email server and a Windows backdoor malware, dubbed OpenCarrot. OpenCarrot enables full compromise of infected machines, as well as the coordination of multiple infections across a local network. "Our analysis attributes the email server compromise to the ScarCruft threat actor," SentinelOne said in a blog post. "We also identify the separate use of a Lazarus group backdoor for compromise of their internal network." Evidence was detected accidentally SentinelOne revealed that it accidentally ran into the evidence of the intrusion while hunting and tracking suspected North Korean threat actors. "(We) identified a leaked email collection containing an implant with characteristics related to previously reported DPRK-affiliated threat actor campaigns," SentinelOne said. "We are highly confident that the emails related to this activity originate from the victim organization, NPO Mashinostroyeniya." The leaked emails in question date back to mid-May 2022, a week after Russia vetoed a resolution to impose new sanctions on North Korea for intercontinental ballistic missile launches. Internal NPO Mashinostroyeniya emails show IT staff exchanged discussions highlighting questionable communications between specific processes and unknown external infrastructure, according to SentinelLabs. "The same day, the NPO Mashinostroyeniya staff also identified a suspicious DLL file present in different internal systems," SentinelOne added. The discovered emails were likely leaked accidentally or resulted from activities unrelated to the NPO Mash intrusion as the leaked data comprises a substantial volume of emails unrelated to the research scope, SentinelOne said. Compromise of Linux-based email server After examining the emails and investigating the two separate sets of suspicious activities, questionable communications, and the DLL implant, SentinelOne was able to establish a correlation between them and a respective threat actor. The cybersecurity firm discovered that the suspicious network traffic discussed in emails is the compromise of the business' Linux email server, hosted publicly at (185.24.244[.]11). "At the time of discovery, the email server was beaconing outbound to the infrastructure we now attribute to the ScarCruft threat actor," SentinelOne said. "The internal host, the organization's Red Hat email server, was actively compromised and in communication with the attackers' malicious infrastructure," SentinelOne said. "A review of all details concludes the threat actor was likely operating on this server for an extensive period of time prior to the internal team's discovery." ScarCruft group, also referred to as Inky Squid, APT37, or Group123, is commonly attributed to North Korea's state-sponsored activity, targeting high-value individuals and organizations globally. Although SentinelOne was unable to confirm the initial access method and the implant running on the email server at the time of discovery, it has linked the tooling and techniques used to previous ScarCruft activities using the RokRAT backdoor. Involvement of Lazarus group The second part of the intrusion, the DLL implant, was attributed to another North Korea-related cybercrime group, the Lazarus group. "During our investigation, we identified the suspicious file in question to be a version of the OpenCarrot Windows OS backdoor, previously identified by IBM XForce as part of Lazarus group activities," SentinelOne said. The analyzed OpenCarrot sample was implemented as a Windows service DLL file, intended to execute persistently, according to the firm. The discovered OpenCarrot variant implements over 25 backdoor commands with a wide range of functionality representative of Lazarus group backdoors. Specific functionalities supported in this campaign included reconnaissance, filesystem and process manipulation, reconfiguration, and C2 connectivity. In line with the usual methods of the Lazarus group, OpenCarrot undergoes ongoing alterations that may not always be incremental. Related content brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe