HomeSecurity ArchitectureLazarus Group Targets Nuclear Facilities with Fake Job Scams in DeathNote Campaign

Lazarus Group Targets Nuclear Facilities with Fake Job Scams in DeathNote Campaign

Published on

spot_img

In a recent series of cyberattacks, the notorious Lazarus Group has shifted its focus towards targeting employees in nuclear-related organizations with a new wave of assaults. This campaign, known as “Operation DreamJob” or the DeathNote series, demonstrates a refined infection chain that combines both old and new malware to enhance stealth and persistence.

The strategic approach taken by Lazarus in these attacks involves exploiting fake job opportunities to infiltrate its victims. Traditionally, the group has used malicious documents or trojanized tools like VNC or PuTTY to lure targets. However, in this latest campaign, Lazarus took a more sophisticated approach by distributing malicious archive files disguised as skill assessments for IT roles at renowned defense and aerospace firms.

Two employees from a nuclear organization were specifically targeted with ISO files containing trojanized VNC software. These files were able to bypass detection by including malicious executables like AmazonVNC.exe and a readme.txt file with connection instructions. Once executed, these files deployed a downloader named Ranid Downloader to initiate further attacks.

The infection chain in this campaign revealed the deployment of several malware strains, including MISTPEN, RollMid, and LPEClient. MISTPEN acted as a loader for additional payloads, fetching new malware from command-and-control (C2) servers. Meanwhile, RollMid and LPEClient, relatively new tools in Lazarus’s arsenal, were used to escalate the attack.

One notable aspect of this campaign was the reappearance of CookieTime malware, which now downloads additional payloads, allowing for lateral movement within networks. One such payload was CookiePlus, a newly discovered modular malware disguised as a Notepad++ plugin, showcasing the group’s evolving techniques.

CookiePlus, in particular, represents a significant advancement in Lazarus’s capabilities. Acting as a downloader, it supports various execution methods and employs sophisticated encryption techniques like RSA and ChaCha20 to protect its communications and payloads. Its modular design allows for adaptability, with plugins performing tasks such as data exfiltration and lateral movement, highlighting Lazarus’s efforts to evade detection.

The group utilized compromised WordPress servers as C2 infrastructure, hosting PHP-based web services across various regions, making it difficult for defenders to track and block their activities. This decentralized setup adds to the challenges faced by cybersecurity professionals in combatting Lazarus’s attacks.

Overall, the introduction of CookiePlus marks a shift in Lazarus’s strategy towards modular malware frameworks to enhance attack efficiency. As their tactics evolve, organizations in sectors like nuclear energy, aerospace, and defense need to remain vigilant and deploy robust defenses to mitigate the risks posed by this relentless adversary. Staying ahead of the curve is imperative as Lazarus continues to refine its methods and pose an ever-increasing threat to cybersecurity.

Source link

Latest articles

Microsoft Addresses Two Publicly Disclosed Zero-Day Vulnerabilities

Microsoft Addresses Vulnerabilities in March Patch Tuesday Update In a significant update beneficial for system...

New European Emissions Regulations Incorporate Cybersecurity Rules

Cybersecurity Regulations and the Right-to-Repair: A Conflicted Future As automakers navigate the implementation of new...

Global Authorities Shut Down 45,000 Malicious IP Addresses Linked to Ransomware Campaigns

An unprecedented international law enforcement initiative has successfully dismantled a vast cybercrime network, showcasing...

Tycoon 2FA Explodes as Europol and Vendors Take Down Phishing Platform

Tycoon 2FA Crashes as Europol and Vendors Take Down Phishing Platform In a significant crackdown...

More like this

Microsoft Addresses Two Publicly Disclosed Zero-Day Vulnerabilities

Microsoft Addresses Vulnerabilities in March Patch Tuesday Update In a significant update beneficial for system...

New European Emissions Regulations Incorporate Cybersecurity Rules

Cybersecurity Regulations and the Right-to-Repair: A Conflicted Future As automakers navigate the implementation of new...

Global Authorities Shut Down 45,000 Malicious IP Addresses Linked to Ransomware Campaigns

An unprecedented international law enforcement initiative has successfully dismantled a vast cybercrime network, showcasing...