HomeCII/OTLazarus Group Attacks Nuclear Industry Using CookiePlus Malware

Lazarus Group Attacks Nuclear Industry Using CookiePlus Malware

Published on

spot_img

The notorious Lazarus hacking group, known to have ties to the North Korean government, has recently shifted its focus towards targeting individuals within the nuclear industry. This shift marks a potential escalation in their operations, as they have previously concentrated on sectors like defense, aerospace, and cryptocurrency. The group’s activities were highlighted in the latest threat intelligence report published by Securelist by Kaspersky.

According to the report, the Lazarus Group is employing fake job postings as part of their attacks, a tactic known as Operation DreamJob. This tactic involves luring potential victims with enticing career opportunities, only to deliver malicious files disguised as job assessments during the “interview” process. These malicious files are often presented in the form of ZIP archives containing executables or trojanized legitimate tools like VNC viewers.

Once executed, the trojanized files allow the attackers to gain unauthorized access to the victim’s machine, enabling them to move laterally within the network and potentially steal sensitive data or disrupt critical operations. The group’s use of sophisticated tools like Ranid Downloader and a new plugin-based malware called “CookiePlus” further complicates detection by operating primarily in memory.

One of the key advancements in Lazarus Group’s recent attacks is the introduction of CookiePlus, a modular malware that dynamically loads malicious payloads in memory. This evasive technique poses a challenge for traditional security solutions in detecting and mitigating the threat. By continuously refining their tools and tactics, the Lazarus Group aims to maintain a persistent presence within targeted networks and achieve their objectives.

Recent discoveries by Group-IB revealed the Lazarus Group’s new trojan, “RustyAttr,” which hides malicious code in extended attributes on macOS systems. Additionally, the group exploited a Google Chrome zero-day vulnerability to target cryptocurrency investors with a deceptive NFT game. These incidents underscore the need for continuous vigilance to safeguard digital assets in the face of escalating cyber threats.

As the Lazarus Group continues to evolve and refine their tactics, it is imperative for organizations, particularly those in sensitive industries, to enhance their cybersecurity measures. The increasing sophistication and activity of the Lazarus Group serve as a stark reminder of the persistent threat posed by state-sponsored hacking groups. By staying informed and implementing robust security measures, organizations can better protect themselves against sophisticated cyber threats.

Source link

Latest articles

Inside EkoParty Miami Featuring Federico Kirschbaum

Upcoming Live Session on Cybersecurity: Join Federico Kirschbaum for an Interactive Discussion A significant event...

Imposter Microsoft Support Website Deceives Users into Downloading Malware

Cybercriminals Target Users with Fake Microsoft Support Website Recently, a wave of cybercrime has emerged,...

TP-Link Devices Vulnerable Due to Multiple Security Flaws Allowing Takeover

Security Vulnerabilities Uncovered in TP-Link Archer AX53 Router Recent investigations by cybersecurity researchers have revealed...

Palo Alto Cortex Vulnerability in Microsoft Teams Allows Attackers to Access Data

A high-severity security vulnerability has been identified in the Microsoft Teams integration for Palo...

More like this

Inside EkoParty Miami Featuring Federico Kirschbaum

Upcoming Live Session on Cybersecurity: Join Federico Kirschbaum for an Interactive Discussion A significant event...

Imposter Microsoft Support Website Deceives Users into Downloading Malware

Cybercriminals Target Users with Fake Microsoft Support Website Recently, a wave of cybercrime has emerged,...

TP-Link Devices Vulnerable Due to Multiple Security Flaws Allowing Takeover

Security Vulnerabilities Uncovered in TP-Link Archer AX53 Router Recent investigations by cybersecurity researchers have revealed...