Kaspersky cybersecurity experts: To evade detection, it host its communications with the C2 on public cloud services and hides the main malware with steganography.
Intezer cyber security experts: It exploits undocumented techniques to stay under the radar and target publicly accessible Docker servers with DynDNS service and unique DGA based on Dogecoin.
Palo Alto Networks cyber security experts: Over 300 coronavirus themed malicious code samples communicated with 20 unique IP addresses and domain indicators of compromise (IOCs).
Digital Shadows and ESTsecurity cyber security experts: North Korea’s hackers exploited cloud-related platforms to distribute malware, evade detection, and minimize the group’s footprint.