• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

WinorDLL64 Backdoor Linked to Lazarus Group

You are here: Home / General Cyber Security News / WinorDLL64 Backdoor Linked to Lazarus Group
February 23, 2023

A payload of the Wslink downloader named WinorDLL64 has been linked to the North Korea-aligned highly developed persistent danger (APT) regarded as Lazarus Group.

The link was created by cybersecurity researchers at Eset, who posted an posting about it earlier nowadays.

“Wslink […] is a loader for Windows binaries that, contrary to other this sort of loaders, runs as a server and executes acquired modules in memory,” wrote Eset malware analyst Vladislav Hrčka.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


According to the advisory, the first Wslink compromise vector was not recognized, but the malware was uploaded to VirusTotal from South Korea next the publication of the corporation advisory.

“The WinorDLL64 payload serves as a backdoor that most notably acquires considerable system information and facts, supplies signifies for file manipulation, these kinds of as exfiltrating, overwriting, and eradicating files, and executes further commands,” wrote Hrčka.

Even more, the Wslink loader listens on a port specified in the file configuration. It can reportedly serve other connecting customers and load extra payloads.

Initially viewed by the Eset team in 2021, Wslink was not promptly associated by the security specialists with Lazarus. The relationship was built only not long ago owing to an overlap in the specific location, actions and code with recognized Lazarus samples. In certain, the overlaps have been observed with two Lazarus-attributed campaigns: procedure GhostSecret and the Bankshot implant.

“WinorDLL64 incorporates an overlap in the growth surroundings, habits, and code with many Lazarus samples, which indicates that it may well be a device from the huge arsenal of this North-Korea-aligned APT group,” Hrčka stated.

A lot more info about the samples analyzed by Eset, as nicely as associated indicators of compromise (IoT), are presented in the company’s advisory.

The technological publish-up arrives weeks after the US Federal Bureau of Investigation (FBI) linked Lazarus Team to the $100m theft from cryptocurrency organization Harmony. More lately, the APT was observed committing an “operational security oversight” while targeting investigate, clinical and power sector corporations.


Some parts of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «lockbit leaks 44gb of royal mail's data and sets fresh LockBit leaks 44GB of Royal Mail’s data and sets fresh £33 million ransom
Next Post: Even Top-Ranked Android Apps in Google Play Store Provide Misleading Data Safety Labels even top ranked android apps in google play store provide misleading»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Copyright © TheCyberSecurity.News, All Rights Reserved.