Categories: CyberCrimeSecurity

North Korea ‘Hacked Russian Missile Firm’

Two distinct North Korean state-affiliated hacking groups compromised the same Russian missile engineering company last year, researchers have found.

The engineering company NPO Mashinostroyeniya, known as NPO Mash, based in Reutov, near Moscow, was separately compromised by the ScarCruft and Lazarus hacking groups for at least five months in 2022, according to computer security firm SentinelOne.

NPO Mash is a leading manufacturer of missiles and spacecraft for the Russian military and possesses highly sensitive missile technology, SentinelOne said.

The Mountain View, California-based security firm said it stumbled upon the hack when it discovered a cache of internal communications accidentally leaked by an NPO Mash IT staff member who was investigating the North Korean hack.

Soyuz rocket launch at Baikonur Cosmodrome, November 2013. Image credit: NASA

Russians hacked

SentinelOne said its subsequent investigation found the ScarCruft threat group had compromised an NPO Mash Linux email server, while Lazarus Group had implanted a Windows backdoor called OpenCarrot into NPO Mash’s internal network.

ScarCruft, also known as APT37, is associated with North Korea’s Ministry of State Security (MSS), while Lazarus Group is part of Lab 110, linked to the Reconnaissance General Bureau (RGB), the country’s primary foreign intelligence agency.

The security firm said it was unclear whether the two firms had worked together or whether the target had been deemed “important enough to assign to multiple independent threat actors”.

The hack was evidently intended to obtain information that could aid North Korea’s project of building an intercontinental ballistic missile (ICBM) capable of reaching targets in North America, SentinelOne said.

Soyuz launch pad at Baikonur Cosmodrome, November 2013. Image credit: NASA

Crypto thefts

It was unable to determine what data, if any, had been stolen.

NPO Mash internally detected the intrusions in May 2022, the security firm said, adding that the intrusions had been in place since roughly late 2021.

The incident shows that North Korea is willing to attack even its own allies to support its missile programme, said researcher Tom Hegel.

NPO Mash has been associated with cutting-edge missile technology including hypersonic missiles and the use of solid propellants.

North Korea is believed to be behind billions of dollars in cryptocurrency thefts since 2017, with the stolen funds thought to constitute about half of the funding for its missile programme.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago