How North Korean Hackers attack. Google’s threat analysis group reports that hackers based on North Korea are targeting individual security using Novel Social Engineering Method. The targets are working on vulnerability research and development. The attackers can use this information in the future state-sponsored attacks.
Hackers set up a cybersecurity blog and Series of Twitter accounts in apparent attempt to build credibility. The blog focused on writing up vulnerabilities that were ready to public. Meanwhile the Twitter accounts posted links to the blog, as well as other alleged exploits. Google reported that several cases of research machines got infected beacause of visiting the hackers blog.
The method involved contacting security researchers and ask them to colaborate on their work.