Close Menu
  • Latest News
    • Bitcoin
    • Ethereum
    • Altcoins
    • Meme Coins
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Gaming
  • Legal
    • Legal and Regulatory
    • Adoption
  • Analysis
  • Learn
    • Education
    • Wallets and Exchanges
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
What's Hot

Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

May 14, 2026

UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

May 14, 2026

Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

May 14, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
Facebook X (Twitter) Instagram
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
  • Latest News
    1. Bitcoin
    2. Ethereum
    3. Altcoins
    4. Meme Coins
    5. View All

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    70% of long-term holders are in profit as the bitcoin floor hardens

    May 13, 2026

    What’s Really At Stake In The Market Structure Debate: The BRCA

    May 13, 2026

    Strategy adds 535 BTC – Still ‘buying the dip’ or something else entirely?

    May 13, 2026

    Bitcoin, Ethereum and XRP Price Analysis: What’s Coming Next?

    May 13, 2026

    Wells Fargo Boosts Ethereum ETF Holdings in Q1

    May 13, 2026

    Why Market Experts Are Still Predicting A Rise Above $10,000

    May 13, 2026

    Bitmine ETH Holdings Cross 5.2 Million—CEO Announces New Phase For Crypto Markets

    May 12, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026

    XRP Ledger Hits Record High In 10K+ Wallets: Santiment

    May 13, 2026

    Mysterious Bitcoin Whale Transfers $40B After Years Of Silence

    May 13, 2026

    First Hyperliquid ETF Launch: Day One Volume Hits $1.8M–Key Details

    May 13, 2026

    Meme Coin Market Faces Imbalance as Supply Rises, Demand Falls

    April 4, 2026

    Crypto Interest Rising Toward Meme Coin Sector

    January 9, 2026

    Memes Market Cap Adds $10B in Days: Fresh Capital or Dead-Cat-Bounce?

    January 5, 2026

    Meme Coin Market Surges Past $45B as Shiba Inu, PEPE, BONK Stage 54% Price Pump

    January 4, 2026

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026
  • Tech
    1. Blockchain
    2. Security and Privacy
    3. View All

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    UXLINK And Origins Network Partner To Power Scalable AI-Driven Web3 Applications Using Decentralized Computing

    May 13, 2026

    WheelX.fi Expands Cross-Chain Liquidity Access Through KiteAI Integration

    May 13, 2026

    TopNod Integrates Hyperliquid – The Future of Seamless On-Chain Perpetual Trading

    May 13, 2026

    Ripple Shares DPRK Threat Data on Fraud Domains, Wallets, Campaigns

    May 5, 2026

    Digital Asset Security Moves Beyond Keys as Bitgo Adds 5-Layer Checks

    May 1, 2026

    Defillama Confirms April 2026 as Crypto’s Most-Hacked Month With 30 Incidents

    May 1, 2026

    Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto W

    April 29, 2026

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026
  • Web 3
    1. Gaming
    2. View All

    NUMINE Joins Outer Ring MMO for the Expansion of Web3 Gaming Experiences

    May 13, 2026

    GMatrixs And MiniverseCore Join Forces To Unlock Web3 Gaming Experience With Cross-Chain DApp, DeFi Applications

    May 11, 2026

    The Identity Crisis of 2026: NFTs, AI Agents and Trust on the Agentic Web

    May 11, 2026

    DTCC’s May 2026 Tokenization Announcement Explained: What It Means for U.S. Securities and Real-World Assets

    May 11, 2026

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026
  • Legal
    1. Legal and Regulatory
    2. Adoption
    3. View All

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    Three men charged in US over crypto wrench attack spree

    May 13, 2026

    CLARITY Act faces 100+ amendments as bankers send 8,000 demand letters against stablecoin rewards

    May 13, 2026

    Bhutan’s GMC offers quick licenses, bank accounts to lure crypto firms

    May 13, 2026

    Tether launches decentralized local AI using Isaac Asimov’s Psychohistory straight out of Foundation

    May 11, 2026

    Has Donald Trump been a net positive for Bitcoin or created an unbreakable partisan divide?

    May 10, 2026

    BlackRock looks to sidestep Clarity yield issues, filing for two new tokenized money market funds

    May 10, 2026

    Cardano’s Charles Hoskinson says the future of crypto wallets will be inside iPhones and Androids

    May 8, 2026

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026
  • Analysis

    Wall Street is buying XRP while Binance traders keep betting against it

    May 13, 2026

    Is a Drop Below $1 Coming Next?

    May 13, 2026

    UB Price Breakout Enters Discovery Phase

    May 13, 2026

    Injective (INJ) Price Explodes 13% After Bullish Breakout—Is a Rally to $6 Next?

    May 13, 2026

    Bitcoin (BTC) Price Holds Strong Above $80K Despite Hot CPI Data—Is Retail Accumulation Returning?

    May 13, 2026
  • Learn
    1. Education
    2. Wallets and Exchanges
    3. View All

    What’s on the Ethereum Roadmap: Glamsterdam, Hegota and Beyond

    March 30, 2026

    What Is Bluesky? The Decentralized Social Media Rival to Elon Musk’s X

    March 27, 2026

    What Is Strategy (MSTR)? The Bitcoin Treasury Company

    February 21, 2026

    What Are Prediction Markets? How Polymarket, Kalshi and Myriad Work

    February 13, 2026

    Coinbase went down for over 5 hours after missing earnings. Bulls still see a path to $300 billion by 2030

    May 8, 2026

    Coinbase cuts 14% of staff as Armstrong ties cost reset to AI and market volatility

    May 6, 2026

    Bitcoin is still in charge

    May 3, 2026

    CLARITY Act stablecoin fight shifts from yield to who captures digital-dollar economics

    April 29, 2026

    Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

    May 14, 2026

    UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

    May 14, 2026

    Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

    May 14, 2026

    Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know

    May 14, 2026
  • Tools
    • Market Overview
    • Exchange Tool
  • INFO@FREE.CC
Free.cc (Free Cryptocurrency)Free.cc (Free Cryptocurrency)
Home»Security and Privacy»Template Injection Attacks: Nefarious Actors Lie in Wait in North Korea
Template Injection Attacks: Nefarious Actors Lie in Wait in North Korea
Security and Privacy

Template Injection Attacks: Nefarious Actors Lie in Wait in North Korea

October 9, 2025No Comments5 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Several cybercrime predictions have been made for 2023.

Thales, for example, has outlined 16 potential trends to watch, stating that attackers could begin to target standalone 5G networks and space tech such as satellites, major cryptocurrencies and deepfake technologies more actively. While attackers will undoubtedly evolve their methods to catch potential victims off guard, we’re also likely to see them leaning further into those tried and tested techniques that have recently caused major havoc. 

At Menlo Security, we expect this to be the case with template injection attacks – a topic discussed in my previous two Infosecurity Magazine columns. 

In October, we initially looked at how weaponized template injection documents work and how organizations can combat them. The Menlo Labs research team expanded its studies into template injection attacks – efforts that led us to uncover several weaponized documents using an interesting camouflage technique covered in a second column. 

If you are new to the topic, I recommend reading both of those first. We’ll now dive deeper into new findings that explore which parties may be responsible for the current wave of weaponized document attacks.

Lokibot and a Range of Similar Samples

During this latest analysis, we noticed that North Korean threat actors have been using tactics, techniques and procedures (TTPs) similar to those seen in previous threats, sharing many indicators of compromise (IOCs).

We came across a 2020 article by Fortinet, which revealed that they had previously been leveraging a seemingly benign Microsoft Word document that outlined South Korea’s supposed response to COVID-19 – this was designed to trick victims into downloading the BabyShark malware through the use of a malicious macro. 

See also  #BHEU: North Korea’s Cyber-Offense Strategy Evolving to Focus on International Economic Targets

In another campaign, North Korean threat actors previously sent falsified emails impersonating global delivery specialist FedEx, encouraging targets to open an executable disguised as a PDF to exfiltrate data. Critically, this IOC was used by LokiBot in other similar attacks dating back to 2018.

We also uncovered a sample of similar attacks on Joe Sandbox that showed that the standard North Korean language, Munhwaŏ, was the common resource language for both LokiBot and a similar URL structure. These were also similar to those analyzed in my previous columns. 

Looking at the malicious documents, we found that the metadata was repeated in all 57 samples analyzed. While some used camouflaged URLs with periods and others did not, all samples used template injection TTPs and exploited the CVE-2017-0199 vulnerability.

BlueNoroff’s SnatchCrypto Campaign

The repetition doesn’t end there. Kaspersky’s Securelist blog also highlights the use of similar TTPs by BlueNoroff – a North Korean APT group that typically targets cryptocurrency firms.

In a recent SnatchCrypto campaign, the attack group analyzed the inner workings of successful cryptocurrency startups to understand interactions between individuals. This, in turn, allowed the attackers to manipulate trust in internal communications and execute high-quality social engineering attacks. 

Using these tactics, BlueNoroff has successfully leveraged macro-enabled documents or older exploits, including CVE-2017-0199, that initially allows for the automatic execution of a remote script linked to a weaponized document. 

How does this execution work in practice? Essentially, it happens in three steps.

First, exploiting CVE-2017-0199 sees the retrieval of remote content via an embedded URL inside one of the document meta files. This contains two Base64-encoded binary objects – one for 32-bit Windows and one for 64-bit Windows. 

See also  North Korean Actor Deploys Novel Malware Campaign Against Crypto Firms

Next, this document fetches a second remote template containing a VBA macro that extracts one of these objects, enabling the spawn of a new process (notepad.exe) to inject and execute the binary code.

Third, the VBA macro does a clean-up by removing the binary objects and any reference to the remote template from the original document and saving it to the same file, essentially de-weaponizing the document.

Similar TTPs Used in a Malicious Email Campaign

Alongside the BlueNoroff example, there is evidence to suggest that a North Korean threat actor used similar TTPs in a malicious email campaign that spoofed reach outs from job recruiters. 

Each spoofed email housed malicious documents designed to again exploit CVE-2017-0199 by executing a malicious dynamic link library (DLL) to steal victim information. In this example, data would be exfiltrated, compressed, encrypted and Base64 encoded before being transmitted to a command-and-control server. 

It was identified that the threat actors were exfiltrating the data to malicious domains, such as shopandtravelusa[.]com, while they also hosted a webmail login that appeared to be a phishing site. In other words, it is possible that this could have been a multi-use command-and-control server – something that North Korean threat actors have a track record for. 

On 27 June 2022, for example, Twitter user ‘Phantom XSec’ reported that a North Korean phishing site with a link containing a (naver[.]challengedrive[.]42web.io) was targeting “defectors” in South Korea, showcasing a link that contained a Base64-encoded Google drive URL and victim email. Here, the site would ask users to identify themselves before they became able to download the malicious Google drive link.

See also  Chaos RAT Used to Enhance Linux Cryptomining Attacks

Today’s Threats Will Persist

Our research shows that many of the TTPs used by weaponized document attacks were not only similar but had identical footprints and IOCs, enabling us to attribute the metadata to a single threat actor. 

Given the methods used and the trail of data points uncovered, it is highly likely that each of the weaponized document attack methods discussed here can be attributed to a threat actor operating out of North Korea, likely tied to the infamous Lazarus group.

Indeed, North Korean cyber-criminals are renowned for their continued reliance on aging malicious infrastructure.

Moving forward, we don’t expect this to change. While threat actors will continue evolving their malware and infrastructure, the overlap in TTPs will ensure we keep a close eye on attacks from North Korean actors. 

Actors Attacks injection Korea Lie Nefarious North Template Wait
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Judge clears path for Aave to move $71 million in ETH linked to North Korea hack

May 9, 2026

South Korea to Impose Crypto Tax, Starting January 2027

May 9, 2026

Ripple Shares DPRK Threat Data on Fraud Domains, Wallets, Campaigns

May 5, 2026

South Korea crypto sector warns AML proposal goes too far: Report

May 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

VitaminAi Taps ALFΛ to Redefine Web3 Social Competition and On-Chain Gaming

October 30, 2025

Spot Bitcoin ETFs Record $787 Million Inflows, End 5-Weeks Of Consecutive Outlows

March 2, 2026

Stay ahead with the latest crypto news, market updates, blockchain insights, and trends. Your trusted source for everything happening in the digital asset world.


We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Consensys Urges SEC to Exempt Self-Custody Wallets, Citing Regulatory Gap for 99% of Tokens

May 14, 2026

UBOX Taps ClawWorks to Accelerate Independent AI Agent Economics

May 14, 2026

Analyst Says No Reason for Bitcoin Reversal, Sees BTC Approaching Next Resistance Levels – Here Are His Targets

May 14, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Free.cc directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
  • Disclosure
© 2026 free.cc - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.