• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers exploiting vmware horizon to target south korea with nukesped

Hackers Exploiting VMware Horizon to Target South Korea with NukeSped Backdoor

You are here: Home / General Cyber Security News / Hackers Exploiting VMware Horizon to Target South Korea with NukeSped Backdoor
May 20, 2022

The North Korea-backed Lazarus Team has been noticed leveraging the Log4Shell vulnerability in VMware Horizon servers to deploy the NukeSped (aka Manuscrypt) implant towards targets found in its southern counterpart.

“The attacker employed the Log4j vulnerability on VMware Horizon items that ended up not utilized with the security patch,” AhnLab Security Emergency Response Center (ASEC) mentioned in a new report.

The intrusions are reported to have been 1st found in April, even though many risk actors, such as these aligned with China and Iran, have employed the identical approach to additional their goals above the past handful of months.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper take secure and enxrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


NukeSped is a backdoor that can complete a variety of destructive activities based on commands acquired from a remote attacker-controlled area. Past 12 months, Kaspersky disclosed a spear-phishing campaign aimed at thieving critical data from protection companies using a NukeSped variant identified as ThreatNeedle.

Some of the vital functions of the backdoor assortment from capturing keystrokes and getting screenshots to accessing the device’s webcam and dropping supplemental payloads these types of as information and facts stealers.

CyberSecurity

The stealer malware, a console-based mostly utility, is developed to exfiltrate accounts and passwords saved in web browsers like Google Chrome, Mozilla Firefox, Internet Explorer, Opera, and Naver Whale as properly as facts about email accounts and just lately opened Microsoft Office and Hancom information.

“The attacker collected supplemental data by utilizing backdoor malware NukeSped to mail command line instructions,” the scientists stated. “The gathered info can be utilized later on in lateral motion attacks.”

Uncovered this post intriguing? Abide by THN on Fb, Twitter  and LinkedIn to read through far more distinctive articles we publish.


Some elements of this write-up are sourced from:
thehackernews.com

Previous Post: «qnap nas drives targeted by deadbolt ransomware for the third QNAP NAS drives targeted by DeadBolt ransomware for the third time this year
Next Post: Microsoft says its provided over $100 million in tech support to Ukrainian government microsoft says its provided over $100 million in tech support»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • UK’s Most Innovative Cyber SME 2022 Finalists Announced
  • Mark Zuckerberg Sued Over Cambridge Analytica Data Breach
  • Yes, Containers Are Terrific, But Watch the Security Risks
  • Snake Keylogger Spreads Through Malicious PDFs
  • Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns
  • Ransomware Hackers Steal Personal Data of 500,000 Students and Staff in Chicago
  • PayPal Pays a Hacker $200,000 for Discovering ‘One-Click-Hack’ Vulnerability
  • Anonymous Declares Cyber-War on Pro-Russian Hacker Gang Killnet
  • Chinese “Twisted Panda” Hackers Caught Spying on Russian Defense Institutes
  • Why don’t we ever hear about ransomware demands in the tens of millions of dollars?

Copyright © TheCyberSecurity.News, All Rights Reserved.