Close Menu
  • Latest News
    • Bitcoin
    • Ethereum
    • Altcoins
    • Meme Coins
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Gaming
  • Legal
    • Legal and Regulatory
    • Adoption
  • Analysis
  • Learn
    • Education
    • Wallets and Exchanges
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
What's Hot

EtherMail adds email identity for AI agents

March 6, 2026

SuperRare Liquid Editions: The Next Evolution of NFTs

March 6, 2026

OKX is building a social network directly into its trading app after a massive $25 billion valuation

March 6, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
Facebook X (Twitter) Instagram
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
  • Latest News
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. Meme Coins
    5. View All

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026

    The Core Issue: Consensus Cleanup

    March 6, 2026

    Canada launches new multi-crypto ETF as banks enter the sector

    March 6, 2026

    Bitcoin Price Debate Ignites as Bull Trap Warning Clashes With On-Chain Data

    March 6, 2026

    Top Analyst Reveals What’s Next For Bitcoin, Ethereum and XRP

    March 5, 2026

    Ethereum Price Analysis: Institutional Buying Returns as Whales Accumulate

    March 5, 2026

    Ethereum Hovers at $2,150 — Can ETH Price Rally to $2,400 or Stall Below $2,200?

    March 5, 2026

    Vitalik Buterin Admits Ethereum Hasn’t Meaningfully Improved People’s Lives

    March 5, 2026

    How Extreme Negative Funding Is Priming XRP For A High-Velocity Trend Reversal

    March 6, 2026

    Bitcoin Liquidity Set To Expand With Morgan Stanley BTC ETF Option

    March 6, 2026

    Bitcoin Suppressed By Shadow Banking Rehypothecation: Saylor

    March 5, 2026

    XRP Price Retests Decade-Old Trendline That Previously Triggered 630%+ Rallies

    March 5, 2026

    Crypto Interest Rising Toward Meme Coin Sector

    January 9, 2026

    Memes Market Cap Adds $10B in Days: Fresh Capital or Dead-Cat-Bounce?

    January 5, 2026

    Meme Coin Market Surges Past $45B as Shiba Inu, PEPE, BONK Stage 54% Price Pump

    January 4, 2026

    US Ranks #1 in CoinGecko Global Meme Coin Interest Report

    December 18, 2025

    EtherMail adds email identity for AI agents

    March 6, 2026

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026
  • Tech
    1. Blockchain
    2. Security and Privacy
    3. View All

    EtherMail adds email identity for AI agents

    March 6, 2026

    Pi Network Co-Founder Unveils Crucial KYC Updates Every Pioneer Needs to Know

    March 6, 2026

    Startale App Integrates Kyo Finance to Power Seamless Swaps on Soneium

    March 6, 2026

    ICB Network and Mokoko AI Entail Strategic Partnership to Transform Web3 Gaming Infrastructure

    March 6, 2026

    Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

    March 4, 2026

    DOJ seizures of $580M expose how crypto investment scams scaled into shift work with quotas and scripts

    March 3, 2026

    Aeternum Botnet Shifts Command Control to Polygon Blockchain

    February 27, 2026

    Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

    February 26, 2026

    EtherMail adds email identity for AI agents

    March 6, 2026

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026
  • Web 3
    1. Gaming
    2. View All

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    METYA Partners With Kult Games to Expand Web3 Gaming Ecosystem

    March 6, 2026

    AurumX Collaborates with FishWar to Redefine Web3-Based Gaming Economies

    March 5, 2026

    C. Thi Nguyen: Prioritizing enjoyment over efficiency in games, the pitfalls of social media scoring systems, and how metrics can obscure true value

    March 4, 2026

    EtherMail adds email identity for AI agents

    March 6, 2026

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026
  • Legal
    1. Legal and Regulatory
    2. Adoption
    3. View All

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026

    Reform UK tops donations with millions from Thailand-based crypto investor: Report

    March 6, 2026

    Donald Trump’s crypto legacy in two words: Paul Atkins

    March 6, 2026

    International finance watchdog warns stablecoins are increasingly used in sanctions evasion and money laundering

    March 5, 2026

    XRP and XRPL get a credibility lift from Ripple’s expanding footprint

    March 5, 2026

    XRP rewrites the playbook for altcoin ETF approvals to surge in late 2026 after a wave of futures listings

    March 4, 2026

    Bitcoin ETF custody concentrates power in one place, and now a single operational failure causes dangerous ripples

    March 3, 2026

    Revolut’s stablecoin test targets its 12M UK users

    March 3, 2026

    EtherMail adds email identity for AI agents

    March 6, 2026

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026
  • Analysis

    XRP Price Consolidates Under $1.5 — What Could Drive the Next Move to $2?

    March 5, 2026

    Israel’s weekly $3B Iran war cost equals over 41,000 Bitcoin

    March 5, 2026

    Chainlink Price Gains Attention After Visa e-HKD Pilot and LINK Chart Signals Possible Breakout

    March 5, 2026

    Can the Bulls Push the Price to $1.16 as $1 Resistance is Back in Focus

    March 5, 2026

    Bitcoin investors may not need altcoins to diversify if tokenized stocks move on-chain

    March 5, 2026
  • Learn
    1. Education
    2. Wallets and Exchanges
    3. View All

    What Is Strategy (MSTR)? The Bitcoin Treasury Company

    February 21, 2026

    What Are Prediction Markets? How Polymarket, Kalshi and Myriad Work

    February 13, 2026

    What Is Farcaster? The Decentralized Social Media Protocol

    February 10, 2026

    What Is Venice AI? The Privacy-Focused Chatbot

    January 13, 2026

    Crypto platform aims to let retail investors buy IPO shares at the same price as Wall Street insiders

    March 6, 2026

    The company holding all Bitcoin ETF coins is losing money, resurfacing questions about centralization

    February 21, 2026

    The Bitcoin CME gap will now close forever in May leaving a return to $84k hanging

    February 21, 2026

    Robinhood’s $221 million crypto revenue drop shows crypto winter isn’t on chain and retail already moved

    February 16, 2026

    EtherMail adds email identity for AI agents

    March 6, 2026

    SuperRare Liquid Editions: The Next Evolution of NFTs

    March 6, 2026

    OKX is building a social network directly into its trading app after a massive $25 billion valuation

    March 6, 2026

    Crypto leaked by South Korean tax officials stolen a second time

    March 6, 2026
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
Home»Security and Privacy»Template Injection Attacks: Nefarious Actors Lie in Wait in North Korea
Template Injection Attacks: Nefarious Actors Lie in Wait in North Korea
Security and Privacy

Template Injection Attacks: Nefarious Actors Lie in Wait in North Korea

October 9, 2025No Comments5 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Several cybercrime predictions have been made for 2023.

Thales, for example, has outlined 16 potential trends to watch, stating that attackers could begin to target standalone 5G networks and space tech such as satellites, major cryptocurrencies and deepfake technologies more actively. While attackers will undoubtedly evolve their methods to catch potential victims off guard, we’re also likely to see them leaning further into those tried and tested techniques that have recently caused major havoc. 

At Menlo Security, we expect this to be the case with template injection attacks – a topic discussed in my previous two Infosecurity Magazine columns. 

In October, we initially looked at how weaponized template injection documents work and how organizations can combat them. The Menlo Labs research team expanded its studies into template injection attacks – efforts that led us to uncover several weaponized documents using an interesting camouflage technique covered in a second column. 

If you are new to the topic, I recommend reading both of those first. We’ll now dive deeper into new findings that explore which parties may be responsible for the current wave of weaponized document attacks.

Lokibot and a Range of Similar Samples

During this latest analysis, we noticed that North Korean threat actors have been using tactics, techniques and procedures (TTPs) similar to those seen in previous threats, sharing many indicators of compromise (IOCs).

We came across a 2020 article by Fortinet, which revealed that they had previously been leveraging a seemingly benign Microsoft Word document that outlined South Korea’s supposed response to COVID-19 – this was designed to trick victims into downloading the BabyShark malware through the use of a malicious macro. 

See also  United States, Korea, and Brazil Eye Crypto Tax Crackdown

In another campaign, North Korean threat actors previously sent falsified emails impersonating global delivery specialist FedEx, encouraging targets to open an executable disguised as a PDF to exfiltrate data. Critically, this IOC was used by LokiBot in other similar attacks dating back to 2018.

We also uncovered a sample of similar attacks on Joe Sandbox that showed that the standard North Korean language, Munhwaŏ, was the common resource language for both LokiBot and a similar URL structure. These were also similar to those analyzed in my previous columns. 

Looking at the malicious documents, we found that the metadata was repeated in all 57 samples analyzed. While some used camouflaged URLs with periods and others did not, all samples used template injection TTPs and exploited the CVE-2017-0199 vulnerability.

BlueNoroff’s SnatchCrypto Campaign

The repetition doesn’t end there. Kaspersky’s Securelist blog also highlights the use of similar TTPs by BlueNoroff – a North Korean APT group that typically targets cryptocurrency firms.

In a recent SnatchCrypto campaign, the attack group analyzed the inner workings of successful cryptocurrency startups to understand interactions between individuals. This, in turn, allowed the attackers to manipulate trust in internal communications and execute high-quality social engineering attacks. 

Using these tactics, BlueNoroff has successfully leveraged macro-enabled documents or older exploits, including CVE-2017-0199, that initially allows for the automatic execution of a remote script linked to a weaponized document. 

How does this execution work in practice? Essentially, it happens in three steps.

First, exploiting CVE-2017-0199 sees the retrieval of remote content via an embedded URL inside one of the document meta files. This contains two Base64-encoded binary objects – one for 32-bit Windows and one for 64-bit Windows. 

See also  Coinbase Attackers Bypassed Account Authentication

Next, this document fetches a second remote template containing a VBA macro that extracts one of these objects, enabling the spawn of a new process (notepad.exe) to inject and execute the binary code.

Third, the VBA macro does a clean-up by removing the binary objects and any reference to the remote template from the original document and saving it to the same file, essentially de-weaponizing the document.

Similar TTPs Used in a Malicious Email Campaign

Alongside the BlueNoroff example, there is evidence to suggest that a North Korean threat actor used similar TTPs in a malicious email campaign that spoofed reach outs from job recruiters. 

Each spoofed email housed malicious documents designed to again exploit CVE-2017-0199 by executing a malicious dynamic link library (DLL) to steal victim information. In this example, data would be exfiltrated, compressed, encrypted and Base64 encoded before being transmitted to a command-and-control server. 

It was identified that the threat actors were exfiltrating the data to malicious domains, such as shopandtravelusa[.]com, while they also hosted a webmail login that appeared to be a phishing site. In other words, it is possible that this could have been a multi-use command-and-control server – something that North Korean threat actors have a track record for. 

On 27 June 2022, for example, Twitter user ‘Phantom XSec’ reported that a North Korean phishing site with a link containing a (naver[.]challengedrive[.]42web.io) was targeting “defectors” in South Korea, showcasing a link that contained a Base64-encoded Google drive URL and victim email. Here, the site would ask users to identify themselves before they became able to download the malicious Google drive link.

See also  Crypto heists reach $2.1B so far in 2025 as state-backed hackers ramp up attacks

Today’s Threats Will Persist

Our research shows that many of the TTPs used by weaponized document attacks were not only similar but had identical footprints and IOCs, enabling us to attribute the metadata to a single threat actor. 

Given the methods used and the trail of data points uncovered, it is highly likely that each of the weaponized document attack methods discussed here can be attributed to a threat actor operating out of North Korea, likely tied to the infamous Lazarus group.

Indeed, North Korean cyber-criminals are renowned for their continued reliance on aging malicious infrastructure.

Moving forward, we don’t expect this to change. While threat actors will continue evolving their malware and infrastructure, the overlap in TTPs will ensure we keep a close eye on attacks from North Korean actors. 

Actors Attacks injection Korea Lie Nefarious North Template Wait
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Ethereum Queue Hits 3.4M ETH, 60-Day Wait

March 4, 2026

Trump urges passage of U.S. Clarity Act, attacks banks for ‘undercutting’ GENIUS

March 4, 2026

Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

March 4, 2026

DOJ seizures of $580M expose how crypto investment scams scaled into shift work with quotas and scripts

March 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Hong Kong Advances Crypto Trading and Custody Licensing Plans

December 29, 2025

Bitcoin OTC Balance Records Rapid Outflows — What’s Next For Price?

February 22, 2026

Stay ahead with the latest crypto news, market updates, blockchain insights, and trends. Your trusted source for everything happening in the digital asset world.


We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

EtherMail adds email identity for AI agents

March 6, 2026

SuperRare Liquid Editions: The Next Evolution of NFTs

March 6, 2026

OKX is building a social network directly into its trading app after a massive $25 billion valuation

March 6, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Free.cc directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
© 2026 free.cc - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.