Analysts at a US cybersecurity firm have detected an apparent new mine for a mine that mines in Pyongyang, North Korea

As the cybersecurity firm AlienVault reported Jan. 8, the malware surfaced around Christmas Eve and contains facilities that Monolith to a wallet associated with North Korea Kim Il Sung University.

AlienVault notes some contradictory features in the malware, making it difficult to ascertain its author, purpose and likely metamorphosis. In their report, the researcher comments:

"It's not clear if we're looking at an early test of an attack, or part of a 'legitimate' mining operation where the owners of the hardware are aware of the mining. It would be an attacker would avoid. But it also contains filenames that seem to be an attempt to avoid detection of the installed software. "

Noting the" unusually open "nature of the alleged host university, it could even be that the

The AlienVault report breaks down the possible scenarios, given the data at hand:

"The hostname barjuok.ryongnamsan.edu.kp address does not currently resolve. That means the software can not send money to the authors – on most networks. It may be that: The application is designed to be run by another network, such as that of the university itself gold The use of a North Korean server is a prank to trick security researchers. "

AlienVault also notes that if the North Korean government is in fact behind the operation

In late December, the CEO of Crowdstrike, a US cybersecurity company, told reporters that he was in charge of a financial lifeline. was born in the North Korean government was stealing and stockpiling cryptocurrency.

The new malware's appearance marks the latest phase in the cyberwarfare afflicting the two Koreas. Last month, North Korean state-funded hackers were reportedly heavily involved in cryptocurrency theft targeting the South Korea's exchanges.

In an experimental 'white hat hack' in late December, a Seoul-based media outlet United Nations, Great Britain, Great Britain, Great Britain, United Kingdom