Reimagining Public Sector Analytics
Home News Industry North Korean cyber attackers use ‘SharpTongue’ spyware to hack into Gmail accounts

North Korean cyber attackers use ‘SharpTongue’ spyware to hack into Gmail accounts

‘SharpTongue’ spyware programme is targeting and victimising individuals working for organisations in the United States, Europe and South Korea.

‘SharpTongue’ spyware to hack into Gmail accounts

In the latest attacks, operated from North Korea, hackers are using malicious Google Chrome or Chromium-based Microsoft Edge extension to hack into user email accounts.

According to the latest reports, the malicious extension by the hacker group titled SharpTongue' is capable of stealing email content from and AOL, according to cybersecurity firm Volexity.

“This actor is believed to be North Korean in origin and is often publicly referred to under the name Kimsuky. The definition of which threat activity comprises Kimsuky is a matter of debate among threat intelligence analysts,” a cybersecurity research platform said.

As per reports ‘' spyware programme is targeting and victimising individuals working for organisations in the United States, Europe and South Korea who work on topics involving North Korea, nuclear issues, weapons systems, and other matters of strategic interest to North Korea.

Within the last year, Volexity has responded to multiple incidents involving SharpTongue and, in most cases, has discovered a malicious Google Chrome or Microsoft Edge extension dubbed as ‘SHARPEXT'.

“Since its discovery, the extension has evolved and is currently at version 3.0, based on the internal versioning system. It supports three web browsers and theft of mail from both Gmail and AOL webmail,” the research platform said.

By stealing email data in the context of a user's already-logged-in session, the attack is hidden from the email provider, making detection very challenging.

Similarly, the way in which the extension works means suspicious activity would not be logged in a user's email ‘account activity' status page, were they to review it, the cybersecurity firm noted.

Exit mobile version