FBI warns of North Korean Password-Stealing Tools Brambul and Joanap

Written byHeloise Montini
Heloise Montini

Heloise Montini is a content writer whose background in journalism make her an asset when researching and writing tech content. Also, her personal aspirations in creative writing and PC gaming make her articles on data storage and data recovery accessible for a wide audience.

Edited byLaura Pompeu
Laura Pompeu

With 10 years of experience in journalism, SEO & digital marketing, Laura Pompeu uses her skills and experience to manage (and sometimes write) content focused on technology and business strategies.

Co-written byBogdan Glushko
Bogdan Glushko

CEO at SalvageData Recovery, Bogdan Glushko has over 18 years of experience in high-security data recovery. Over the years, he's been able to help restore data after logical errors, physical failures, or even ransomware attacks, for individuals, businesses, and government agencies alike.

I think there's an issue with my storage device, but I'm not sure
Start a free evaluation

Your passwords can be the gateway to your company’s data. Hackers understand this, it’s why they deploy password-stealing tools to harvest this information.The FBI, along with the Department of Homeland Security announced North Korean hackers are using a remote access tool called Joanap, and a Server Message Blockwork called Brambul to target companies in certain industries such as financial, media, and infrastructure.

Meet Joanap

Joanap is a password-stealing tool that’s quite versatile. ZDNet reports it infects files which a user can receive through an email attachment or via download when they’re visiting a website that hackers have compromised. From there, hackers can remote access the malware using a command-and-control server. This gives them the ability to do terrible things ranging from stealing your data to creating or erasing directories in node management. The FBI states it’s found compromised network nodes in many countries including China, Brazil, Iran, and Pakistan.

What is Brambul?

According to ZDNet, Brambul is a malicious Windows 32-bit SMB worm installed onto networks through dropper malware. Once infected, the malware will try to connect to systems within the local subnets. It also deploys a brute-force password attack to gain access to the SMB protocol using embedded passwords.If successful, the malware can relay information about these compromised systems back to hackers. From there, it’s a feeding frenzy whereby hackers gain access to the passwords and usernames of each system and can use it to gather the data they want.

How Do I Stop These Password-Stealing Attacks?

The FBI recommends for companies and personal users to keep software up to date on all devices including any patches made for operating systems. Since many malware programs attack the vulnerabilities found in outdated applications and operating systems, a simple update can help keep your information safe. It’s also important to have antivirus installed on each device. Along with quarantining harmful files, some software programs are proactive in that they warn you before you visit an unsecured website that could be compromised by hackers.Another important consideration is to use common sense when online. As part of this, only download applications, attachments and more from known sources. If you receive an email that contains an attachment from an unknown sender or it seems random, it’s best to ignore it.Last, but certainly not least, communication plays a crucial role in keeping your data safe. Your company should have safeguards in place where regular communications about malware threats are sent to each member along with steps to prevent it from happening. And if someone’s device becomes infected, having a reaction plan in place can help to mitigate risk.

What Happens if My Data Becomes Compromised?

Not having access to your files can be a frustrating experience. Allow the team at Salvage Data to allay your fears by helping you recapture your data in quick fashion. Our team has ample experience in extracting files from corrupted devices. Allow us to put our expertise to work for you, contact us today to learn more.

Share this article

Related services

These are the most commonly requested data recovery services. At our headquarters' cleanroom lab, our certified engineers conduct a thorough review of any type of physical storage device, determining if there is logical or physical damage and carefully restoring all of the lost files.ces.

External Drive Data Recovery

We recover data from both external SSD and HDD drives. Rely on certified experts to restore your important files from damaged or corrupted external drives.

/services/data-recovery/external-drive/

Hard Drive Data Recovery

Recover data from all brands of HDD, PC hard drives, and hybrid disks. Our specialists ensure fast and secure recovery for any data loss scenario.

/services/data-recovery/hard-drive/

NAS Data Recovery

Recover data from NAS devices, including RAID configurations. Our team handles all types of NAS systems and ensures data recovery with minimal downtime.

/services/data-recovery/nas/

RAID Data Recovery

Our RAID data recovery services cover RAID 0, 1, 5, 10, and other configurations. We offer expert solutions for failed, degraded, or corrupted RAID arrays.

/services/data-recovery/raid/

SAN Data Recovery

Our team specializes in handling SAN devices from leading manufacturers like Dell EMC, HP, and IBM, ensuring efficient recovery with minimal disruption to your operations.

/services/data-recovery/san/

SD Card Data Recovery

Our recovery experts specialize in restoring data from SD and memory cards. We guarantee quick recovery with a no-data, no-charge policy.

/services/data-recovery/sd-card/

SSD Data Recovery

Our data recovery experts handle all SSD data loss scenarios with advanced tools, ensuring maximum recovery with high-security protocols.

/services/data-recovery/ssd/

USB Flash Drive Data Recovery

Recover lost data from USB flash drives, regardless of the damage or brand. We offer free in-lab evaluations to assess data recovery needs.

/services/data-recovery/usb-flash-drive/

If you’re unsure about which data recovery service to choose, let our team assist you in selecting the appropriate solutions. We understand the anxiety that comes with a sudden drive failure, and we are more prompt in our actions compared to other recovery service providers.