• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
north korea linked hackers target us energy sector by exploiting vmware

North Korea-linked hackers target US energy sector by exploiting VMware Horizon

You are here: Home / General Cyber Security News / North Korea-linked hackers target US energy sector by exploiting VMware Horizon
September 9, 2022

Shutterstock

The North Korean point out-sponsored APT Lazarus Team has been determined as conducting a new destructive campaign that exploits vulnerabilities in VMware Horizon to get access to organisations in the electrical power sector.

As observed and thorough by Cisco Talos Intelligence, the attackers have targeted electricity companies from the US and somewhere else all over the planet, which includes Canada and Japan.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The group’s purpose is to use VMware’s vulnerabilities to infiltrate these organizations and establish lengthy-phrase obtain, just before shifting laterally across the enterprises to exfiltrate information of fascination back to North Korea.

Once the initial foothold is recognized, the attackers deploy the group’s tailor made malware implants VSingle and YamaBot, as properly as a previously unknown implant that Talos has named “MagicRAT”.

“The most important target of these attacks was possible to set up extended-phrase entry into sufferer networks to carry out espionage functions in help of North Korean government goals,” Cisco Talos claimed in a site submit.

“This activity aligns with historic Lazarus intrusions concentrating on critical infrastructure and strength companies to build lengthy-time period access to siphon off proprietary intellectual property.”

The cybersecurity agency reported the original attack vector was the exploitation of the Log4j vulnerability on uncovered VMware servers, which led to the obtain of their toolkit from web servers.

This, alongside with quite a few other facets, matched similar attacks carried out and observed in other attacks earlier this 12 months. The IP handle employed as a hosting system for the destructive tools was also located to be an overlap.

“Although the identical ways have been utilized in the two attacks, the resulting malware implants deployed have been distinctive from one an additional, indicating the vast variety of implants out there at the disposal of Lazarus,” Talos additional.

MagicRAT

In a abide by-up put up, Cisco Talo detailed the freshly-found Distant Access Trojan (RAT) it has dubbed “MagicRAT”, which it believes with “moderate to significant confidence” was deployed by Lazarus as part of these attacks on energy organizations.

Described as “relatively simple” in terms of capability, the RAT was programmed in C++ and constructed with recourse to the Qt framework, with the sole intention of creating human examination more difficult and automated detection fewer probably, Talos stated.

Evidence was also discovered to propose that, once MagicRAT is deployed on infected techniques, it then launches further payloads these as customized-developed port scanners, the business included. The RAT’s C2 infrastructure was also applied to host more recent variants of known Lazarus implants these types of as TigerRAT.

“The discovery of MagicRAT in the wild is an indication of Lazarus’ motivations to quickly develop new, bespoke malware to use alongside with their beforehand known malware these kinds of as TigerRAT to concentrate on organisations throughout the world,” Cisco Talos mentioned.


Some parts of this post are sourced from:
www.itpro.co.uk

Previous Post: «hackers exploit zero day in wordpress backupbuddy plugin in ~5 million Hackers Exploit Zero-Day in WordPress BackupBuddy Plugin in ~5 Million Attempts
Next Post: Microsoft: Iranian hackers breached Albanian government more than a year before main hack microsoft: iranian hackers breached albanian government more than a year»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
  • Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
  • New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
  • Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability
  • MongoDB CISO: Don’t be afraid to simplify important issues for executives
  • Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam
  • Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
  • Lazarus blamed for 3CX attack as byte-to-byte code match discovered
  • New Cylance Ransomware strain emerges, experts speculate about its notorious members
  • 3CX Supply Chain Attack — Here’s What We Know So Far

Copyright © TheCyberSecurity.News, All Rights Reserved.