Skip to content
  • Home
  • Science and Technology
  • Edge computing and IoT
  • Cybersecurity
  • Information Technology
  • Artificial Intelligence
  • Advanced Technologies

Lazarus Group Exploits Zero-Day Vulnerability to Hack South Korean Financial Entity

Posted on March 8, 2023March 9, 2023 By Jerry Simmons

[ad_1]

Mar 08, 2023Ravie LakshmananZero-Day / BYOVD Attack

North Korean Hackers

The North Korea-linked Lazarus Group has been observed weaponizing flaws in an undisclosed software to breach a financial business entity in South Korea twice within a span of a year.

While the first attack in May 2022 entailed the use of a vulnerable version of a certificate software that’s widely used by public institutions and universities, the re-infiltration in October 2022 involved the exploitation of a zero-day in the same program.

Cybersecurity firm AhnLab Security Emergency Response Center (ASEC) said it’s refraining from mentioning the software owing to the fact that “the vulnerability has not been fully verified yet and a software patch has not been released.”

The adversarial collective, after obtaining an initial foothold by an unknown method, abused the zero-day bug to perform lateral movement, shortly after which the AhnLab V3 anti-malware engine was disabled via a BYOVD attack.

It’s worth noting here that the Bring Your Own Vulnerable Driver, aka BYOVD, technique has been repeatedly employed by the Lazarus Group in recent months, as documented by both ESET and AhnLab in a series of reports late last year.

Zero-Day Vulnerability

Among other steps to conceal its malicious behavior include changing file names before deleting them and modifying timestamps using an anti-forensic technique referred to as timestomping.

The attack ultimately paved the way for multiple backdoor payloads (Keys.dat and Settings.vwx) that are designed to connect to a remote command-and-control (C2) server and retrieve additional binaries and execute them in a fileless manner.

Discover the Latest Malware Evasion Tactics and Prevention Strategies

Ready to bust the 9 most dangerous myths about file-based attacks? Join our upcoming webinar and become a hero in the fight against patient zero infections and zero-day security events!

RESERVE YOUR SEAT

The development comes a week after ESET shed light on a new implant called WinorDLL64 that’s deployed by the notorious threat actor by means of a malware loader named Wslink.

“The Lazarus group is researching the vulnerabilities of various other software and are constantly changing their TTPs by altering the way they disable security products and carry out anti-forensic techniques to interfere or delay detection and analysis in order to infiltrate Korean institutions and companies,” ASEC said.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



[ad_2]

Source_link

Cybersecurity

Post navigation

Previous Post: Get 1 TB of secure cloud storage for just $140
Next Post: Realme shamelessly clones Apple’s Dynamic Island with newly launched C55

Related Posts

Critical Security Vulnerabilities Discovered in Netcomm and TP-Link Routers Cybersecurity
How to Detect New Threats via Suspicious Activities Cybersecurity
QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates Cybersecurity
Gootkit Malware Continues to Evolve with New Components and Obfuscations Cybersecurity
U.K. and U.S. Sanction 7 Russians for TrickBot, Ryuk, and Conti Ransomware Attacks Cybersecurity
Is Once-Yearly Pen Testing Enough for Your Organization? Cybersecurity

Archives

  • March 2023
  • February 2023
  • January 2023

Categories

  • Advanced Technologies
  • Artificial Intelligence
  • Cybersecurity
  • Edge computing and IoT
  • Information Technology
  • Science and Technology

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access
  • Why cars running on e-fuel can’t replace EVs
  • Google’s cloud gaming ambitions died with Stadia, exec reveals
  • Wii U memory errors are a new problem for old game consoles
  • Silvergate has collapsed – The Verge

Recent Comments

    AndNews.

    Powered by PressBook Masonry Dark