USA authorities said malware developed in North Korea is still lurking in many computer networks, giving hackers backdoor access to government, financial, automotive and media organisations. The technical alert from the Federal Bureau of Investigation and Department of Homeland Security says a remote administration tool (RAT) called FALLCHILL has been deployed by Hidden Cobra since 2016 to target the aerospace, telecommunications and finance industries.
United States officials earlier this year blamed the group for a series of cyberattacks dating back to 2009, saying it was linked to the Pyongyang government.
The FBI and DHS' U.S. Computer Emergency Readiness Team said in the alert issued Tuesday that they identified internet protocol addresses and other threat indicators linked to the Fallchill malware.
FALLCHILL allows Hidden Cobra to issue commands to a victim's server by dual proxies, which means it can potentially perform actions like retrieving information about all installed disks, accessing files, modifying file or directory timestamps and deleting evidence that it's been on the infected server.
Hackers in the Hidden Cobra or Lazarus group have been active since 2009 and "have leveraged their capabilities to target and compromise a range of victims", according to a DHS report in June.
Last month, Britain had blamed North Korea for being behind the WannaCry cyber attack in May which had disrupted the nation's health services and businesses.
It said FBI investigators suspect the Fallchill tool has been used since 2016 and Volgmer since 2013.
"Some intrusions have resulted in the exfiltration of data while others have been disruptive in nature", the report added.