Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Feds Warn of North Korea-Linked 'Fallchill' Malware

North Korean hackers have been targeting the private sector including the aerospace and finance industries.

By Michael Kan
November 15, 2017
North Korea flag

The US government is warning that North Korean state-sponsored hackers have been targeting the aerospace, telecommunications, and finance sectors since 2016 with malware that can secretly take over a computer.

The Department of Homeland Security and the FBI issued a joint alert Tuesday, which includes technical details about Fallchill, a Remote Administration Tool (RAT) that can give a hacker full control over a victim's computer, allowing them to search, read, write and move files, modify file timestamps, and delete any trace of an infection.

North Korean hackers spread Fallchill in two ways: delivery through other malware or hacking a website and using it to serving malicious code to unsuspecting visitors. Tuesday's alert includes the IP addresses of infected Fallchill systems; if Fallchill is found on a computer, users should flag it and report the incident to the DHS or FBI.

In recent years, North Korea has been accused of orchestrating several major cyberattacks, including the 2014 Sony Pictures Hack and a breach that accessed South Korean warship plans.

Also this week, the US also issued a technical alert for another piece of North Korean-linked malware called Volgmer. According to the alert, the hackers have been using the Trojan since 2013 to attack the government, as well as the automotive and media industries. It too can steal files from a victim's computer, and usually comes from a spear phishing email attack.

Both technical alerts have more details on how companies can protect themselves from the threats. Running up-to-date software, restricting installs of unwanted software, and telling employees to never visit unsolicited links in emails, are among the suggestions.

How Your Password Was Stolen
PCMag Logo How Your Password Was Stolen

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Michael Kan

Senior Reporter

I've been with PCMag since October 2017, covering a wide range of topics, including consumer electronics, cybersecurity, social media, networking, and gaming. Prior to working at PCMag, I was a foreign correspondent in Beijing for over five years, covering the tech scene in Asia.

Read Michael's full bio

Read the latest from Michael Kan