• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

North Korean Lazarus Group Hacked Energy Providers Worldwide

You are here: Home / General Cyber Security News / North Korean Lazarus Group Hacked Energy Providers Worldwide
September 12, 2022

A destructive marketing campaign performed by the North Korean menace actor Lazarus Group qualified power companies about the globe concerning February and July 2022.

The marketing campaign was formerly partially disclosed by Symantec and AhnLab in April and May, respectively, but Cisco Talos is now supplying more facts about it.

Producing in an advisory on Thursday, the security researchers reported the Lazarus campaign involved the exploitation of vulnerabilities in VMWare Horizon to obtain initial entry to targeted companies.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The original vector was the exploitation of the Log4j vulnerability on uncovered VMware Horizon servers. Prosperous post–exploitation led to the obtain of their toolkit from web servers,” the staff wrote.

“In most situations, the attackers instrumented the reverse shell to make their own user accounts on the endpoints they had original entry to.”

In phrases of the resources made use of in these attacks, Cisco Talos explained they uncovered the use of two acknowledged malware family members, VSingle and YamaBot, together with the deployment of a lately disclosed implant they known as ‘MagicRAT.’

“At the time the backdoors and implants ended up persisted and activated on the endpoint, the reverse shell made use of to complete cleanup[…], this involved deleting all information in the an infection folder along with the termination of the PowerShell jobs,” stated Cisco Talos.

“The attacker–created accounts had been eliminated and finally, the Windows Celebration logs […] would be purged.”

According to Cisco Talos, businesses targeted in the current Lazarus attacks provided electricity suppliers from distinct countries, such as the US, Canada and Japan.

“The campaign is meant to infiltrate companies all around the earth for creating long–term entry and subsequently exfiltrating info of interest to the adversary’s nation–state,” reads the technological write–up.

The new Cisco Talos advisory is only the most recent in a prolonged list describing the Lazarus Group’s hacking functions around the summer season.

In June, blockchain analytics business Elliptic recommended the threat actor may be driving the $100m theft from cryptocurrency agency Harmony. Additional not too long ago, The Block connected the group to Axie Infinity’s $600m hack.


Some elements of this report are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News ICO Slams Government Departments Over FOI Failings
Next Post: Vulnerability in WordPress BackupBuddy Plugin Exploited By Hackers Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
  • Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
  • New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
  • Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability
  • MongoDB CISO: Don’t be afraid to simplify important issues for executives
  • Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam
  • Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
  • Lazarus blamed for 3CX attack as byte-to-byte code match discovered
  • New Cylance Ransomware strain emerges, experts speculate about its notorious members
  • 3CX Supply Chain Attack — Here’s What We Know So Far

Copyright © TheCyberSecurity.News, All Rights Reserved.