Sunday, August 14, 2022
-Advertisement-
-Advertisement-
Tech ObserverNewsIndustryNorth Korean cyber attackers use ‘SharpTongue’ spyware to hack into Gmail accounts

North Korean cyber attackers use ‘SharpTongue’ spyware to hack into Gmail accounts

‘SharpTongue’ spyware programme is targeting and victimising individuals working for organisations in the United States, Europe and South Korea.

‘SharpTongue’ spyware programme is targeting and victimising individuals working for organisations in the United States, Europe and South Korea.

In the latest attacks, operated from North Korea, hackers are using malicious Google Chrome or Chromium-based Microsoft Edge extension to hack into user email accounts.

According to the latest reports, the malicious extension by the hacker group titled SharpTongue’ is capable of stealing email content from and AOL, according to cybersecurity firm Volexity.

“This actor is believed to be North Korean in origin and is often publicly referred to under the name Kimsuky. The definition of which threat activity comprises Kimsuky is a matter of debate among threat intelligence analysts,” a cybersecurity research platform said.

As per reports ‘’ spyware programme is targeting and victimising individuals working for organisations in the United States, Europe and South Korea who work on topics involving North Korea, nuclear issues, weapons systems, and other matters of strategic interest to North Korea.

Within the last year, Volexity has responded to multiple incidents involving SharpTongue and, in most cases, has discovered a malicious Google Chrome or Microsoft Edge extension dubbed as ‘SHARPEXT’.

“Since its discovery, the extension has evolved and is currently at version 3.0, based on the internal versioning system. It supports three web browsers and theft of mail from both Gmail and AOL webmail,” the research platform said.

By stealing email data in the context of a user’s already-logged-in session, the attack is hidden from the email provider, making detection very challenging.

Similarly, the way in which the extension works means suspicious activity would not be logged in a user’s email ‘account activity’ status page, were they to review it, the cybersecurity firm noted.

Subscribe to receive the day's headlines from Tech Observer straight in your inbox

- Advertisement -

Your Comment on this Story

Comments

Share on activity feed

Powered by WP LinkPress

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Subscribe to our Newsletter

83000+ Industry Leaders read it everyday

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -ESDS SAP HANA Community Cloud
- Advertisement -Digital Senate 2022

RELATED ARTICLES

- Advertisement -