Threat Intelligence, Privileged access management, Identity![North Korean remote IT worker scam](https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/11/1107_north_korea.jpg)
RID hijacking conducted by Andariel
![North Korean remote IT worker scam](https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/11/1107_north_korea.jpg)
(Adobe Stock)
Windows systems have been duped by North Korean state-sponsored threat group Andariel into seeing admin permissions in low-privileged accounts as part of a Relative Identifier takeover attack that involved the utilization of a custom malicious file and an open source tool, according to BleepingComputer. After leveraging a vulnerability and the privilege escalation tools PsExec and JuicyPotato to gain SYSTEM access on targeted devices, Andariel — which has been associated with North Korean hacking collective Lazarus Group — stealthily established a low-privilege local user before altering the Security Account Manager registry to facilitate RID hijacking, a report from AhnLab Security Intelligence Center showed. Further registry setting modifications and key and account removal were then performed by Andariel to conceal malicious activity, said researchers. Mitigating RID takeovers requires monitoring of logon attempts and password modifications through the Local Security Authority Subsystem Service, as well as limited PsExec, JuicyPotato execution, and the implementation of multi-factor authentication across all accounts.
An In-Depth Guide to Identity
Get essential knowledge and practical strategies to fortify your identity security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds