One of the most prolific advanced threat actors, Lazarus, a North Korean APT group, has been recently tracked and identified to be developing supply chain attack skills, and not only that even for cyber espionage they are using its multi-platform MATA framework.
This North Korean APT group is active since at least 2009, and right now in the current era, this APT group is one of the most active globally. As it has a huge track record of cyber-espionage and ransomware campaigns.
But, through their malicious campaigns and wide range of custom tools, they mostly target the cryptocurrency markets and defense industry to accomplish their goals.
Using the MATA malware framework the operators of the Lazarus group has attacked several industries to steal the customer databases and spread ransomware, but, they mainly target the defense industry, and in the MATA malware framework, they can target three major players:-
According to the Kaspersky report, While Lazarus APT group has attacked the defense industry several times, as last year in mid-2020 the ThreatNeedle campaign was launched by them to target the defense industry.
Moreover, the US Cybersecurity and Infrastructure Security Agency (CISA) reported that Lazarus was building supply chain attack capabilities with an updated DeathNote cluster using a variant of BLINDINGCAN.
The senior security researcher, Global Research and Analysis Team, Kaspersky, Ariel Jungheit stated:-
“These recent developments highlight two things: Lazarus remains interested in the defense industry and is also looking to expand its capabilities with supply chain attacks.”
Several malicious campaigns have been identified in which an IT asset monitoring solution vendor, as well as a think tank in South Korea, were targeted. In these campaigns two types of cases were discovered:-
First case: In an infection chain that is developed by Lazarus, a malicious payload was delivered via legitimate South Korean security software.
Second case: A Latvian asset monitoring company was the target of Lazarus, an atypical victim for the organization.
In its infection chain, the threat actor uses a downloader called Racket, which was signed by using a stolen certificate, to install malware.
To filter and control the malicious implants on successfully breached machines several scripts were uploaded by the actor to the compromised web servers.
Here’s the list of recommendations:-
To stay safe the security analysts of Kaspersky have strongly recommended users to follow and implement all the above-mentioned recommendations immediately.
You can follow us on Linkedin, Twitter, Facebook for daily Cyber security and hacking news updates.
A high-severity security vulnerability discovered in NetApp SnapCenter could allow authenticated users to gain administrative…
A credential rotation error led to widespread service disruptions across multiple Cloudflare products on March…
Raspberry Robin, a complex and evolving malware threat, has been operating since 2019, initially spreading…
Researchers have discovered a major security vulnerability affecting multiple gaming laptop models using Clevo hardware. …
Multiple internet service providers worldwide are reporting widespread disruptions as DrayTek routers enter continuous reboot…
Google's Chrome browser installation process has been disrupted by a significant technical error affecting Windows…