• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Lazarus Group Targeting Microsoft Web Servers to Launch Espionage Malware

You are here: Home / General Cyber Security News / Lazarus Group Targeting Microsoft Web Servers to Launch Espionage Malware
May 24, 2023

North Korea threat actor Lazarus team is targeting Windows IIS web servers to start espionage attacks, according to a new evaluation by AhnLab Security Crisis reaction Middle (ASEC).

The researchers claimed the approach represents a variation on the dynamic-connection library (DLL) aspect-loading approach, a tactic frequently used by the point out-affiliated team.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Here, they imagine the attackers use “poorly managed or vulnerable web servers as their original breach routes before executing their malicious commands later.”

ASEC spelled out: “The menace actor locations a destructive DLL (msvcr100.dll) in the very same folder route as a usual application (Wordconv.exe) via the Windows IIS web server course of action, w3wp.exe. They then execute the ordinary software to initiate the execution of the malicious DLL. In MITRE ATT&CK, this system of attack is categorized as the DLL facet-loading (T1574.002) approach.”

Subsequent original infiltration, Lazarus build a foothold right before producing further malware (diagn.dll) by exploiting the open up-supply ‘color picker plugin,’ which is a plugin for Notepad++. This malware facilitates credential theft and lateral movement, suitable for carrying out espionage operations.

Past year, Microsoft printed an advisory warning that North Korea-involved threat actors weaponizing legit open-source computer software focusing on staff in businesses across multiple industries.

ASEC highlighted the escalating sophistication of Lazarus group, and its abilities to benefit from a vary of attack vectors to carry out their preliminary breach. These have been shown in incidents like Log4Shell, general public certification vulnerability and the 3CX source chain attack.

The researchers warned: “[Lazarus]is a single of the hugely unsafe groups that are actively launching attacks throughout the world. Thus, corporate security professionals should really make use of attack floor management to detect the property that could be uncovered to threat actors and practice warning by making use of the newest security patches every time doable.”

They included that owing to Lazarus’ concentration on the DLL facet-loading system throughout preliminary infiltrations, “companies should really proactively check abnormal method execution associations and just take preemptive actions to reduce the risk group from carrying out things to do this sort of as info exfiltration and lateral movement.”

This week (May well 23, 2023), the US govt declared sanctions on 3 entities since of their url with North Korea’s principal intelligence company, the Reconnaissance Typical Bureau (RGB), which US officials say is at the rear of several of the country’s cyber espionage and cyber theft things to do.


Some components of this post are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News US Sanctions North Korean Entities Training Expat IT Workers in Russia, China and Laos
Next Post: GUAC 0.1 Beta: Google’s Breakthrough Framework for Secure Software Supply Chains guac 0.1 beta: google's breakthrough framework for secure software supply»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Microsoft Uncovers Banking AitM Phishing and BEC Attacks Targeting Financial Giants
  • University of Manchester Suffers Suspected Data Breach During Cyber Incident
  • Asylum Ambuscade: A Cybercrime Group with Espionage Ambitions
  • Barracuda Urges Swift Replacement of Vulnerable ESG Appliances
  • Google Launches Framework to Secure Generative AI
  • 5 Reasons Why Access Management is the Key to Securing the Modern Workplace
  • Security Experts Highlight Exploit for Patched Windows Flaw
  • Minecraft Users Warned of Malware Targeting Modpacks
  • Organizations Urged to Address Critical Vulnerabilities Found in First Half of 2023
  • Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.