Operation SyncHole: Lazarus APT goes back to the well

Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach.

Kaspersky

"🚨 Lazarus Strikes Again: A Deep Dive into Their Latest Campaign 🚨"

The Lazarus group, known for its relentless cyber-espionage campaigns, has unveiled a new wave of attacks. This time, they compromised a software vendor through unpatched legitimate software. Despite available patches, many systems continued using the flawed software, making them easy prey for Lazarus. 🛡️💻

The group's modus operandi involved exploiting these software vulnerabilities and then deploying the SIGNBT malware using a DLL side-loading technique. This malware, SIGNBT, communicates with its C2 server and has a unique identifier, making it a signature Lazarus tool. Moreover, the group also deployed LPEClient, a tool previously seen in attacks on defense contractors and the cryptocurrency sector. 🌐🔗

Lazarus's tactics have evolved, now exploiting high-profile software vulnerabilities to spread their malware efficiently. Their targets span across industries, emphasizing their adaptability and determination. 🎯🌍

Source: Securelist - Unveiling Lazarus' New Campaign

Tags: #Lazarus #CyberSecurity #APT #SIGNBT #LPEClient #SoftwareVulnerability #CyberEspionage 🕵️‍♂️🔍🔐

MITRE ATT&CK - Lazarus

A cascade of compromise: unveiling Lazarus’ new campaign

We unveil a Lazarus campaign exploiting security company products and examine its intricate connections with other campaigns

Kaspersky
"A cascade of compromise: unveiling Lazarus' new campaign" published by Kaspersky. #LPEClient, #SIGNBT, #CTI, #OSINT, #LAZARUS https://securelist.com/unveiling-lazarus-new-campaign/110888/
A cascade of compromise: unveiling Lazarus’ new campaign

We unveil a Lazarus campaign exploiting security company products and examine its intricate connections with other campaigns

Kaspersky