{"id":83613,"date":"2018-01-11T02:00:08","date_gmt":"2018-01-11T10:00:08","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=83613"},"modified":"2025-06-03T20:20:45","modified_gmt":"2025-06-04T03:20:45","slug":"north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/","title":{"rendered":"North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk"},"content":{"rendered":"<p>Recently, South Korean media wrote about North Korean <a href=\"http:\/\/www.newdaily.co.kr\/news\/article.html?no=362555\" target=\"_blank\" rel=\"noopener\">refugees<\/a> and <a href=\"http:\/\/www.dailynk.com\/korean\/m\/read.php?cataId=nk00400&amp;num=111620\" target=\"_blank\" rel=\"noopener\">journalists<\/a> being targeted by unknown actors using KakaoTalk (a popular chat app in South Korea) and other social network services (such as Facebook) to send links to install malware on victims\u2019 devices. This method shows that attackers are always looking for different ways to deliver malware.<\/p>\n<p>The McAfee Mobile Research Team has acquired malicious APK files that were used in the targeted attacks. According to the articles, Google-shortened URLs were used to spread malware. We analyzed those statistics.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83615\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png\" alt=\"\" width=\"1080\" height=\"761\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png 1080w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1-300x211.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1-768x541.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1-1024x722.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1-710x500.png 710w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/><\/a><\/p>\n<p>There are two versions of the dropper malware: &#8220;\ubd81\ud55c\uae30\ub3c4&#8221; (Pray for North Korea) and &#8220;BloodAssistant&#8221; (a health care app). In both cases, most clicks originated in South Korea and the most common browser and operating system combination was Chrome and Windows. (Android was the second most common.) The referrers diagram of BloodAssistant shows Facebook was used in 12% of cases to send the link to its targets.<\/p>\n<p>In the case of the journalist who was targeted, the attacker sent a shortened link showing a thumbnail of another story written by the journalist, according to the news article. The link directs to ihoodtec[.]com\/upload\/newslist[.]php (now offline), which seems to be used for redirecting to links in other domains. This shortened URL was clicked by someone with an account at mail[.]police[.]go[.]kr, suggesting the shortened URL was also sent via email to the police address.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83616\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-2.png\" alt=\"\" width=\"1074\" height=\"370\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-2.png 1074w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-2-300x103.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-2-768x265.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-2-1024x353.png 1024w\" sizes=\"auto, (max-width: 1074px) 100vw, 1074px\" \/><\/a><\/p>\n<p>The number of clicks might not be meaningful because it can include access from malware researchers, but what is meaningful is that malware-download links were spread using different platforms: Facebook, KakaoTalk, email, etc.<\/p>\n<h2><strong>Analysis<\/strong><\/h2>\n<p><em>Dropper<\/em><\/p>\n<p>All the malicious APK files (including additional variants) dropped the Trojan on the victim\u2019s device. Although the apps look different, the dropper mechanism is identical. The following screens show the execution of the dropper files.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83617\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-3.png\" alt=\"\" width=\"602\" height=\"268\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-3.png 602w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-3-300x134.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/p>\n<p><em>Figure <\/em><em>1<\/em><em>:<\/em><em> Screenshots of droppers.<\/em><\/p>\n<p>When the dropper APK executes, it first checks whether the device is already infected. If not infected, it phishes the victim to turn on the accessibility permission. If the victim clicks the pop-up window, the view changes to the accessibility settings menu so the app can acquire the permission.<\/p>\n<p>When the accessibility service starts, it overlays the window (by playing a video, for example) to hide the process of turning on required settings and dropping and installing the Trojan. The overlay is removed after the Trojan is installed. The following diagram explains the flow after executing the dropper malware.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83642\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-12.png\" alt=\"\" width=\"998\" height=\"476\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-12.png 998w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-12-300x143.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-12-768x366.png 768w\" sizes=\"auto, (max-width: 998px) 100vw, 998px\" \/><\/a><\/p>\n<p><em>Figure <\/em><em>2<\/em><em>:<\/em><em> Execution flow of the dropper.<\/em><\/p>\n<p><em>Trojan<\/em><\/p>\n<p>The dropped Trojan uses popular cloud services Dropbox and Yandex as a control server to upload data and receive commands. The following diagram explains the execution flow of the Trojan. The names of broadcast receivers and services (with some misspellings) may vary between samples but the execution is the same.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83643\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-13.png\" alt=\"\" width=\"1052\" height=\"642\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-13.png 1052w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-13-300x183.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-13-768x469.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-13-1024x625.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-13-819x500.png 819w\" sizes=\"auto, (max-width: 1052px) 100vw, 1052px\" \/><\/a><\/p>\n<p><em>Figure <\/em><em>3<\/em><em>:<\/em><em> Execution flow of the Trojan.<\/em><\/p>\n<p>When the dropped Trojan is installed, it saves device information in a temporary folder and uploads it to the cloud. It then downloads a file containing commands and other data to control the infected device. (We\u2019ll explain the format of the downloaded file in the next section.) Most of the malicious behaviors\u2014such as saving SMS, contact information, etc.\u2014are implemented inside a separate dex file \u201ccore,\u201d which is downloaded from the control server. This dex file is referenced in many places in the malware. The malicious functionality can be extended, as we\u2019ll explain in the following section.<\/p>\n<p><em>Command file structure<\/em><\/p>\n<p>The command file has its own format. The following diagram explains the types of values. Offset designators are used to retrieve each value when parsing the file. The next table explains each value.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83620\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-6.png\" alt=\"\" width=\"1040\" height=\"186\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-6.png 1040w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-6-300x54.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-6-768x137.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-6-1024x183.png 1024w\" sizes=\"auto, (max-width: 1040px) 100vw, 1040px\" \/><\/a><\/p>\n<p><em>Figure <\/em><em>4<\/em><em>:<\/em><em> Command file format.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-83621 size-medium\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-7-300x207.png\" alt=\"\" width=\"300\" height=\"207\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-7-300x207.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-7.png 515w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><em>Figure <\/em><em>5<\/em><em>:<\/em><em> Command file values.<\/em><\/p>\n<p>The handler for command code received from the cloud (CMD value) is implemented as a separate dex file and is downloaded either before or after the malware parses the command file. This mechanism allows the attacker to easily extend its malicious functionality without needing to update the whole malware.<\/p>\n<p>Our analysis shows that only some of the commands are implemented now and uploaded to the cloud control server. Note Command 12 captures KakaoTalk chat logs.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-83622 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-8.png\" alt=\"\" width=\"887\" height=\"238\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-8.png 887w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-8-300x80.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-8-768x206.png 768w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/a><\/p>\n<p><em>Figure <\/em><em>6<\/em><em>:<\/em><em> Implemented commands.<\/em><\/p>\n<h2><strong>Variants<\/strong><\/h2>\n<p>We have found variants of the APKs that news articles initially reported on Google Drive. (The APKs on Google Drive are marked as malware and cannot be downloaded.) Some variants use different cloud services as their control servers while others drop the separate call-recording app \u201ccom.toh.callrecord\u201d (assets\/bbb). The following graph shows the relationships among variants and dropped files.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83623\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-9.png\" alt=\"\" width=\"1025\" height=\"675\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-9.png 1025w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-9-300x198.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-9-768x506.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-9-1024x674.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-9-759x500.png 759w\" sizes=\"auto, (max-width: 1025px) 100vw, 1025px\" \/><\/a><\/p>\n<p><em>Figure <\/em><em>7<\/em><em>:<\/em><em> Relationships among variants.<\/em><\/p>\n<h2><strong>The Actors<\/strong><\/h2>\n<p>Initial malicious APKs we found were uploaded to Google Drive by the same account, and we found a connected social network account. By following activities of this account, we conclude with high confidence that this account was used to send shortened URLs to victims to get them to download malicious APK files.<\/p>\n<p>The group behind this campaign is certainly familiar with South Korean culture, TV shows, drama, and the language because the account names associated with the cloud services are from Korean drama and TV shows, including the following:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-83696 alignnone\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-14.png\" alt=\"\" width=\"627\" height=\"246\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-14.png 627w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-14-300x118.png 300w\" sizes=\"auto, (max-width: 627px) 100vw, 627px\" \/><\/a><\/p>\n<p><em>Figure <\/em><em>8<\/em><em>: Cloud service accounts.<\/em><\/p>\n<p>We found the use of an interesting word, \u201c\ud53c\ud615\u201d (\u201cblood type\u201d), which is not used in South Korea but is used in North Korea. (\u201c\ud608\uc561\ud615\u201d is the word for blood type in South Korea.) We also found a North Korean IP address in test log files of some Android devices that are connected to accounts used to spread the malware. However, Wi-Fi was on so we cannot exclude the possibility that the IP address is private.<\/p>\n<p>By looking at the list of deleted folders in the cloud, we found one with the name \u201csun Team Folder,\u201d possibly the name of the actors. This group has been active since 2016, according to the cloud storage creation date.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83625\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-11.png\" alt=\"\" width=\"989\" height=\"51\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-11.png 989w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-11-300x15.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-11-768x40.png 768w\" sizes=\"auto, (max-width: 989px) 100vw, 989px\" \/><\/a><\/p>\n<p><em>Figure 9<\/em><em>:<\/em><em> Deleted folder in the cloud.<\/em><\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>This malware campaign is highly targeted, using social network services and KakaoTalk to directly approach targets and implant spyware. We cannot confirm who is behind this campaign, and the possible actor Sun Team is not related to any previously known cybercrime groups. The actors are familiar with South Korea and appear to want to spy on North Korean defectors, and on groups and individuals who help defectors.<\/p>\n<p>McAfee Mobile Security detects this malware as Android\/HiddenApp.BP. Always keep your mobile security application updated to the latest version, and never install applications from unverified sources. We recommend installing KakaoTalk only from Google Play. These habits will reduce the risk of infection by malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, South Korean media wrote about North Korean refugees and journalists being targeted by unknown actors using KakaoTalk (a popular&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[37,4452,180,214],"coauthors":[3973],"class_list":["post-83613","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-android","tag-cybersecurity","tag-malware","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Recently, South Korean media wrote about North Korean refugees and journalists being targeted by unknown actors using KakaoTalk (a popular chat app in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Recently, South Korean media wrote about North Korean refugees and journalists being targeted by unknown actors using KakaoTalk (a popular chat app in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-11T10:00:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T03:20:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"761\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk\",\"datePublished\":\"2018-01-11T10:00:08+00:00\",\"dateModified\":\"2025-06-04T03:20:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/\"},\"wordCount\":1097,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png\",\"keywords\":[\"android\",\"cybersecurity\",\"malware\",\"mobile security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/\",\"name\":\"North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png\",\"datePublished\":\"2018-01-11T10:00:08+00:00\",\"dateModified\":\"2025-06-04T03:20:45+00:00\",\"description\":\"Recently, South Korean media wrote about North Korean refugees and journalists being targeted by unknown actors using KakaoTalk (a popular chat app in\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk | McAfee Blog","description":"Recently, South Korean media wrote about North Korean refugees and journalists being targeted by unknown actors using KakaoTalk (a popular chat app in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk | McAfee Blog","og_description":"Recently, South Korean media wrote about North Korean refugees and journalists being targeted by unknown actors using KakaoTalk (a popular chat app in","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-01-11T10:00:08+00:00","article_modified_time":"2025-06-04T03:20:45+00:00","og_image":[{"width":1080,"height":761,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk","datePublished":"2018-01-11T10:00:08+00:00","dateModified":"2025-06-04T03:20:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/"},"wordCount":1097,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png","keywords":["android","cybersecurity","malware","mobile security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/","name":"North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png","datePublished":"2018-01-11T10:00:08+00:00","dateModified":"2025-06-04T03:20:45+00:00","description":"Recently, South Korean media wrote about North Korean refugees and journalists being targeted by unknown actors using KakaoTalk (a popular chat app in","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180108-Kakao-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/north-korean-defectors-journalists-targeted-using-social-networks-kakaotalk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/83613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=83613"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/83613\/revisions"}],"predecessor-version":[{"id":215024,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/83613\/revisions\/215024"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=83613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=83613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=83613"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=83613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}