HomeCII/OTNorth Korea Mimics Meta Strategy for Complex Backdoor Deployment at Aerospace Organization

North Korea Mimics Meta Strategy for Complex Backdoor Deployment at Aerospace Organization

Published on

spot_img

North Korea’s state-sponsored hacking group, Lazarus, has been found to possess a new and highly sophisticated backdoor malware named “LightlessCan.” Researchers from ESET discovered the malware after it was used in a cyberattack on a Spanish aerospace company. They believe that LightlessCan is based on source code from Lazarus Group’s well-known BlindingCan remote access Trojan (RAT).

Lazarus Group has gained notoriety over the years for its devastating cyberattacks on various organizations and financial institutions. It first gained widespread attention in 2014 with its attack on Sony Pictures. Since then, it has been responsible for stealing millions of dollars through attacks on banks, infiltrating defense, government, healthcare, and energy organizations, and executing cryptocurrency heists and supply chain attacks.

ESET’s analysis of the attack on the Spanish aerospace company revealed that Lazarus actors initially gained access through a spear-phishing campaign. The threat actor posed as a recruiter for Meta, the parent company of Facebook, and contacted developers at the aerospace firm via LinkedIn Messaging. The employee who fell for the phishing attempt received coding challenges disguised as a test of their programming skills. However, these challenges contained malicious executables that downloaded additional payloads onto the employee’s system upon execution.

The first payload deployed by Lazarus was an HTTPS downloader dubbed NickelLoader. This tool allowed the threat actors to execute any program of their choice in the compromised system’s memory. In this case, Lazarus used it to drop two RATs: a limited-function version of BlindingCan and the newly discovered LightlessCan backdoor. The role of the simplified version of BlindingCan, known as miniBlindingCan, was to collect system information and execute commands from the command-and-control (C2) server.

According to ESET researcher Peter Kálnai, LightlessCan represents a significant new threat for targeted organizations due to its design, which allows Lazarus to conceal malicious activity on compromised systems. This stealthiness hampers real-time monitoring controls and forensic tools from detecting the malware.

LightlessCan includes support for up to 68 distinct commands, many of which mimic native Windows commands for gathering system and environment information. Currently, only 43 of these commands are functional, suggesting that the tool is still under development. However, the researchers note that LightlessCan is more advanced than its predecessor, BlindingCan, as it enables the execution of native Windows commands within the RAT itself.

The use of native Windows commands within the malware provides a significant advantage in terms of stealthiness. It allows LightlessCan to evade real-time monitoring solutions like endpoint detection and response (EDRs) and postmortem digital forensic tools. Additionally, the threat actors have encrypted LightlessCan’s payload in such a way that it can only be decrypted using a specific decryption key tied to the compromised machine. This prevents decryption on any other system, such as one belonging to a security researcher.

Overall, Lazarus Group’s addition of LightlessCan to its arsenal highlights the group’s ongoing development of advanced and evasive malware. Organizations must remain vigilant and implement robust security measures to defend against these persistent threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...