TA406 Hackers Target Government Entities to Steal Login Credentials
The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni, has set its sights on Ukrainian government entities.
Proofpoint researchers have uncovered a dual-pronged offensive involving both credential harvesting and malware deployment through highly targeted phishing campaigns.
The likely objective of these attacks is to gather strategic intelligence on the Russian invasion of Ukraine, reflecting TA406’s historical focus on political and geopolitical insights.

This surge in activity coincides with North Korea’s commitment of troops to assist Russia in late 2024, suggesting an intent to assess the risks to their forces and gauge Russia’s potential demands for additional military support.
DPRK-Linked Group Intensifies
The phishing emails, often sent from spoofed freemail accounts mimicking think tank representatives, leverage current Ukrainian political events as lures.
A notable campaign impersonated a fictitious senior fellow from the nonexistent Royal Institute of Strategic Studies, directing targets to download a password-protected RAR archive from the file-hosting service MEGA.
Once decrypted, the archive deploys a CHM file embedding HTML content that, upon interaction, triggers PowerShell scripts for reconnaissance, collecting data like IP configurations and antivirus details.
This information is Base64-encoded and exfiltrated to a command-and-control (C2) server.
Follow-up emails are sent if targets fail to engage, increasing the pressure to interact with the malicious content.
In parallel, TA406 has distributed HTML attachments and ZIP files containing LNK shortcuts, which execute encoded PowerShell to establish persistence through scheduled tasks and autorun scripts, ensuring long-term access to compromised systems.

Credential Harvesting
Before the malware campaigns, TA406 attempted credential theft by sending fake Microsoft security alerts from Proton Mail accounts to the same Ukrainian targets.
According to the Report, These messages, citing suspicious sign-in activity, directed victims to a compromised domain, jetmf[.]com, previously linked to Naver credential harvesting.
While a specific harvesting page could not be recovered during analysis, the overlap in tactics and targeting strongly suggests TA406’s involvement.
This credential harvesting likely serves as a precursor to deeper intrusions, enabling the group to access sensitive communications and further their espionage efforts.
Unlike Russian threat actors focusing on tactical battlefield data, TA406’s operations appear geared toward understanding Ukraine’s political will to resist the invasion and the broader outlook of the conflict, providing North Korean leadership with critical insights into their strategic positioning.
Indicators of Compromise (IoC)
Indicator | Type | Context | First Seen |
---|---|---|---|
Microft Acount Tearns |
Credential harvest delivery | February 2025 | |
Microsooft |
Credential harvest delivery | February 2025 | |
jetmf[.]com | Domain | Credential harvest delivery | February 2025 |
john.smith.19880@outlook[.]com | Malware delivery | February 2025 | |
john.dargavel.smith46@gmail[.]com | Malware delivery | February 2025 | |
hxxps://mega[.]nz/file/SmxUiA4K#QoS_PYQDnJN4VtsSg5HoCv5eOK0AI1bL6Cw5lxA0zfI | URL | Malware delivery | February 2025 |
hxxp://pokijhgcfsdfghnj.mywebcommunity[.]org/main/test.txt | URL | C2 | February 2025 |
hxxp://pokijhgcfsdfghnj.mywebcommunity[.]org/main/receive.php | URL | C2 | February 2025 |
hxxps://lorica[.]com.ua/MFA/вкладення.zip | URL | Malware delivery | February 2025 |
hxxp://qweasdzxc.mygamesonline[.]org/dn.php | URL | C2 | February 2025 |
hxxp://wersdfxcv.mygamesonline[.]org/view.php | URL | C2 | February 2025 |
58adb6b87a3873f20d56a10ccde457469adb5203f3108786c3631e0da555b917 | SHA256 | Malware delivery | February 2025 |
28116e434e35f76400dc473ada97aeae9b93ca5bcc2a86bd1002f6824f3c9537 | SHA256 | Malware delivery | February 2025 |
2a13f273d85dc2322e05e2edfaec7d367116366d1a375b8e9863189a05a5cec5 | SHA256 | Malware delivery | February 2025 |
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Source link