Close Menu
  • Latest News
    • Bitcoin
    • Ethereum
    • Altcoins
    • Meme Coins
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Gaming
  • Legal
    • Legal and Regulatory
    • Adoption
  • Analysis
  • Learn
    • Education
    • Wallets and Exchanges
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
What's Hot

GameFi is effectively dead as 93% of projects collapse

April 24, 2026

Ripple Joins BIS Taskforce For Cross Border Payments Expansion

April 24, 2026

The market repriced DeFi in just 48 hours

April 24, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
Facebook X (Twitter) Instagram
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
  • Latest News
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. Meme Coins
    5. View All

    The market repriced DeFi in just 48 hours

    April 24, 2026

    Pantera Capital Urges Satsuma To Dump All Bitcoin As Shares Collapse 99%

    April 23, 2026

    Bitcoin funding hits 2023 lows – Why $80K is BTC’s next big test

    April 23, 2026

    Bitcoin Price Jumps Above $78K as Strong Demand Returns: Breakout Ahead?

    April 23, 2026

    Bitmine Stakes 61,232 ETH Worth $142M

    April 22, 2026

    Ethereum Targets Lower Range As Resistance Zone Comes Into Play

    April 22, 2026

    Ethereum Price Rises, But On-Chain Data Signals Weak Demand —What’s Next for ETH?

    April 21, 2026

    Ethereum’s Next Rally May Have Started: But No One Is Talking About It

    April 21, 2026

    Could Ripple XRP Power Cross-Border Payments? Russia’s Early Tests Suggest Potential

    April 23, 2026

    Crypto Billionaire Justin Sun Files Lawsuit Against Trump-Linked World Liberty Financial Over ‘Wrongfully’ Frozen Tokens

    April 23, 2026

    Ethereum Price Rejected Above $2,400, Upside Momentum Starts To Fade

    April 23, 2026

    CEO Calls CLARITY Act ‘Horrible Bill,’ Warns Of Prolonged Crypto Bear Market Ahead

    April 23, 2026

    Meme Coin Market Faces Imbalance as Supply Rises, Demand Falls

    April 4, 2026

    Crypto Interest Rising Toward Meme Coin Sector

    January 9, 2026

    Memes Market Cap Adds $10B in Days: Fresh Capital or Dead-Cat-Bounce?

    January 5, 2026

    Meme Coin Market Surges Past $45B as Shiba Inu, PEPE, BONK Stage 54% Price Pump

    January 4, 2026

    GameFi is effectively dead as 93% of projects collapse

    April 24, 2026

    Ripple Joins BIS Taskforce For Cross Border Payments Expansion

    April 24, 2026

    The market repriced DeFi in just 48 hours

    April 24, 2026

    Explosive Class Action Alleges False Advertising and Market Manipulation in Crypto AI Project

    April 23, 2026
  • Tech
    1. Blockchain
    2. Security and Privacy
    3. View All

    Ripple Joins BIS Taskforce For Cross Border Payments Expansion

    April 24, 2026

    ZetaChain Onboards Kimi and Alibaba Qwen as AI Models Go Cross-Chain

    April 23, 2026

    Monthly Active Addresses Explode – Analyzing the Surge in Layer-1 and Layer-2 Network Utility

    April 23, 2026

    AI agents that trade crypto autonomously are the next big shift in blockchain

    April 23, 2026

    How crypto futures markets are feeding ‘scam coin’ insider pump and dumps

    April 22, 2026

    North Korean Blamed for $290m KelpDAO Crypto Heist

    April 21, 2026

    Chainalysis Flags Critical Blind Spot in DeFi Security as $292M Exploit Bypasses Burn Verification

    April 21, 2026

    Ripple’s Schwartz Flags DeFi Bridge Trade-Offs After KelpDAO Incident

    April 21, 2026

    GameFi is effectively dead as 93% of projects collapse

    April 24, 2026

    Ripple Joins BIS Taskforce For Cross Border Payments Expansion

    April 24, 2026

    The market repriced DeFi in just 48 hours

    April 24, 2026

    Explosive Class Action Alleges False Advertising and Market Manipulation in Crypto AI Project

    April 23, 2026
  • Web 3
    1. Gaming
    2. View All

    GameFi is effectively dead as 93% of projects collapse

    April 24, 2026

    More than 90% of Web3 games failed after $15 billion boom as gamers never showed up: Caladan

    April 23, 2026

    Carbon 2.0: How dMRV Is Turning Carbon Credits Into Data-Driven Assets

    April 23, 2026

    UXLINK Taps ANOME Protocol to Redefine Web3 Gaming, SocialFi, and NFTFi

    April 23, 2026

    GameFi is effectively dead as 93% of projects collapse

    April 24, 2026

    Ripple Joins BIS Taskforce For Cross Border Payments Expansion

    April 24, 2026

    The market repriced DeFi in just 48 hours

    April 24, 2026

    Explosive Class Action Alleges False Advertising and Market Manipulation in Crypto AI Project

    April 23, 2026
  • Legal
    1. Legal and Regulatory
    2. Adoption
    3. View All

    Explosive Class Action Alleges False Advertising and Market Manipulation in Crypto AI Project

    April 23, 2026

    US admiral who blasted crypto is now running a Bitcoin node for America’s security

    April 23, 2026

    Mississippi Law School Requires AI Training as Courts Grapple With the Tech

    April 23, 2026

    Mob boss John Gotti’s grandson is headed to prison for a $1.1 million Covid fraud and crypto scheme

    April 23, 2026

    Oil tanker attacked after falling for crypto scam granting fake Strait of Hormuz safe passage

    April 21, 2026

    Six years after “DeFi Summer” is the sun already setting on the decentralized finance revolution?

    April 20, 2026

    Bitcoin network activity just hit an 8-year low — has Wall Street replaced retail in the market?

    April 19, 2026

    Charles Schwab is bringing uninsured Bitcoin to 39M clients

    April 19, 2026

    GameFi is effectively dead as 93% of projects collapse

    April 24, 2026

    Ripple Joins BIS Taskforce For Cross Border Payments Expansion

    April 24, 2026

    The market repriced DeFi in just 48 hours

    April 24, 2026

    Explosive Class Action Alleges False Advertising and Market Manipulation in Crypto AI Project

    April 23, 2026
  • Analysis

    US Bankers association push for 60 day pause to stop stablecoin rules going live

    April 23, 2026

    ZEC Price Prediction: Zcash Retests Key Level

    April 23, 2026

    Monero Price Analysis: XMR Presses $400 Resistance

    April 23, 2026

    Bitcoin’s uptrend towards $80,000 is increasingly attracting bears

    April 23, 2026

    Traders Bet on $100K Bitcoin Price as Breakout Rally Erases Weeks of Sideways Pain

    April 23, 2026
  • Learn
    1. Education
    2. Wallets and Exchanges
    3. View All

    What’s on the Ethereum Roadmap: Glamsterdam, Hegota and Beyond

    March 30, 2026

    What Is Bluesky? The Decentralized Social Media Rival to Elon Musk’s X

    March 27, 2026

    What Is Strategy (MSTR)? The Bitcoin Treasury Company

    February 21, 2026

    What Are Prediction Markets? How Polymarket, Kalshi and Myriad Work

    February 13, 2026

    Over 80% of Bitcoin ETF assets hit Coinbase custody choke point with $74B at risk

    April 13, 2026

    FTX begins $2.2B payout. Can Bitcoin absorb another liquidity test?

    March 31, 2026

    BlinkEx investment platform infrastructure – matching, risk controls, reliability

    March 21, 2026

    Over $2B in “lost” Bitcoin to hit markets this month creating sell pressure within fragile $67k–$74k range

    March 20, 2026

    GameFi is effectively dead as 93% of projects collapse

    April 24, 2026

    Ripple Joins BIS Taskforce For Cross Border Payments Expansion

    April 24, 2026

    The market repriced DeFi in just 48 hours

    April 24, 2026

    Explosive Class Action Alleges False Advertising and Market Manipulation in Crypto AI Project

    April 23, 2026
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
Home»Security and Privacy»Template Injection Attacks: Nefarious Actors Lie in Wait in North Korea
Template Injection Attacks: Nefarious Actors Lie in Wait in North Korea
Security and Privacy

Template Injection Attacks: Nefarious Actors Lie in Wait in North Korea

October 9, 2025No Comments5 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Several cybercrime predictions have been made for 2023.

Thales, for example, has outlined 16 potential trends to watch, stating that attackers could begin to target standalone 5G networks and space tech such as satellites, major cryptocurrencies and deepfake technologies more actively. While attackers will undoubtedly evolve their methods to catch potential victims off guard, we’re also likely to see them leaning further into those tried and tested techniques that have recently caused major havoc. 

At Menlo Security, we expect this to be the case with template injection attacks – a topic discussed in my previous two Infosecurity Magazine columns. 

In October, we initially looked at how weaponized template injection documents work and how organizations can combat them. The Menlo Labs research team expanded its studies into template injection attacks – efforts that led us to uncover several weaponized documents using an interesting camouflage technique covered in a second column. 

If you are new to the topic, I recommend reading both of those first. We’ll now dive deeper into new findings that explore which parties may be responsible for the current wave of weaponized document attacks.

Lokibot and a Range of Similar Samples

During this latest analysis, we noticed that North Korean threat actors have been using tactics, techniques and procedures (TTPs) similar to those seen in previous threats, sharing many indicators of compromise (IOCs).

We came across a 2020 article by Fortinet, which revealed that they had previously been leveraging a seemingly benign Microsoft Word document that outlined South Korea’s supposed response to COVID-19 – this was designed to trick victims into downloading the BabyShark malware through the use of a malicious macro. 

See also  iPhone a Growing Target of Crypto-Mining Attacks

In another campaign, North Korean threat actors previously sent falsified emails impersonating global delivery specialist FedEx, encouraging targets to open an executable disguised as a PDF to exfiltrate data. Critically, this IOC was used by LokiBot in other similar attacks dating back to 2018.

We also uncovered a sample of similar attacks on Joe Sandbox that showed that the standard North Korean language, Munhwaŏ, was the common resource language for both LokiBot and a similar URL structure. These were also similar to those analyzed in my previous columns. 

Looking at the malicious documents, we found that the metadata was repeated in all 57 samples analyzed. While some used camouflaged URLs with periods and others did not, all samples used template injection TTPs and exploited the CVE-2017-0199 vulnerability.

BlueNoroff’s SnatchCrypto Campaign

The repetition doesn’t end there. Kaspersky’s Securelist blog also highlights the use of similar TTPs by BlueNoroff – a North Korean APT group that typically targets cryptocurrency firms.

In a recent SnatchCrypto campaign, the attack group analyzed the inner workings of successful cryptocurrency startups to understand interactions between individuals. This, in turn, allowed the attackers to manipulate trust in internal communications and execute high-quality social engineering attacks. 

Using these tactics, BlueNoroff has successfully leveraged macro-enabled documents or older exploits, including CVE-2017-0199, that initially allows for the automatic execution of a remote script linked to a weaponized document. 

How does this execution work in practice? Essentially, it happens in three steps.

First, exploiting CVE-2017-0199 sees the retrieval of remote content via an embedded URL inside one of the document meta files. This contains two Base64-encoded binary objects – one for 32-bit Windows and one for 64-bit Windows. 

See also  Cybersecurity Experts Warn Against Valentine's Day Romance Scams

Next, this document fetches a second remote template containing a VBA macro that extracts one of these objects, enabling the spawn of a new process (notepad.exe) to inject and execute the binary code.

Third, the VBA macro does a clean-up by removing the binary objects and any reference to the remote template from the original document and saving it to the same file, essentially de-weaponizing the document.

Similar TTPs Used in a Malicious Email Campaign

Alongside the BlueNoroff example, there is evidence to suggest that a North Korean threat actor used similar TTPs in a malicious email campaign that spoofed reach outs from job recruiters. 

Each spoofed email housed malicious documents designed to again exploit CVE-2017-0199 by executing a malicious dynamic link library (DLL) to steal victim information. In this example, data would be exfiltrated, compressed, encrypted and Base64 encoded before being transmitted to a command-and-control server. 

It was identified that the threat actors were exfiltrating the data to malicious domains, such as shopandtravelusa[.]com, while they also hosted a webmail login that appeared to be a phishing site. In other words, it is possible that this could have been a multi-use command-and-control server – something that North Korean threat actors have a track record for. 

On 27 June 2022, for example, Twitter user ‘Phantom XSec’ reported that a North Korean phishing site with a link containing a (naver[.]challengedrive[.]42web.io) was targeting “defectors” in South Korea, showcasing a link that contained a Base64-encoded Google drive URL and victim email. Here, the site would ask users to identify themselves before they became able to download the malicious Google drive link.

See also  Scam Cryptocurrency Site Shuttered After Stealing £1.5m

Today’s Threats Will Persist

Our research shows that many of the TTPs used by weaponized document attacks were not only similar but had identical footprints and IOCs, enabling us to attribute the metadata to a single threat actor. 

Given the methods used and the trail of data points uncovered, it is highly likely that each of the weaponized document attack methods discussed here can be attributed to a threat actor operating out of North Korea, likely tied to the infamous Lazarus group.

Indeed, North Korean cyber-criminals are renowned for their continued reliance on aging malicious infrastructure.

Moving forward, we don’t expect this to change. While threat actors will continue evolving their malware and infrastructure, the overlap in TTPs will ensure we keep a close eye on attacks from North Korean actors. 

Actors Attacks injection Korea Lie Nefarious North Template Wait
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

South Korea tax agency opens bidding for crypto tracing tool

April 22, 2026

How crypto futures markets are feeding ‘scam coin’ insider pump and dumps

April 22, 2026

North Korean Blamed for $290m KelpDAO Crypto Heist

April 21, 2026

Chainalysis Flags Critical Blind Spot in DeFi Security as $292M Exploit Bypasses Burn Verification

April 21, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Cardano’s Charles Hoskinson Mocks SEC in Coinbase Fight: “Gary Can Come In”

September 14, 2025

Fake Tokens Exploit BRICS Investment Hype

September 24, 2025

Stay ahead with the latest crypto news, market updates, blockchain insights, and trends. Your trusted source for everything happening in the digital asset world.


We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

GameFi is effectively dead as 93% of projects collapse

April 24, 2026

Ripple Joins BIS Taskforce For Cross Border Payments Expansion

April 24, 2026

The market repriced DeFi in just 48 hours

April 24, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Free.cc directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
© 2026 free.cc - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.