Categories: Cyber Security News

Andariel Hacker Group Uses New Reconnaissance Tactics To Find Right Targets For Their Exploit

Reconnaissance is the key part of a successful attack, Andariel Group which is part of well-known notorious Lazarus Group uses new techniques to find the right targets for their exploit.

The Andariel Group injects their scripts in compromised South Korean websites and collects ActiveX object information before they are to use their exploit.

Andariel group is active for a couple of months. According to IssueMakersLab, the group used an ActiveX zero-day exploit for watering hole attacks on South Korean websites on last May—they called this “Operation GoldenAxe”.

Security researchers from Trend Micro spotted that on June 21 Andariel group injected a new script into four compromised South Korean websites for gathering information. Researchers believe that new script was trying to collect the different ActiveX object and that could be for their next targets for a watering hole exploit attack.

The reconnaissance lasted between June 21 to 27 and the scripts found injected with the compromised Korean non-profit organization and Korean local government labor union websites.

According to researchers, the injected malicious script came form Andariel group as they have the same obfuscation methods and similar to the samples.

Attackers used the script to collect the user information such as visitors’ browser type, system language, Flash Player version, Silverlight version, and multiple ActiveX objects.

Reconnaissance Flow – Andariel Group

1. Attackers compromise the website and inject’s malicious scripts.

2. When a user access the compromised website the malicious script will execute.

3. The Executed malicious script collects the information and sends to the remote server.

4. Attacker get’s information about the target.

When compared to the previous scripts the newly inject script contains two additional ActiveX objects “DSDOWNCTRL.DSDownCtrlCtrl.1” related to Digital Rights Management and “WSACTIVEBRIDGEAX.WSActiveBridgeAXCtrl.1” that related to South Korea-based voice conversion software that used by many public and government institutions.

Also, the new script adds WebSocket along with new ActiveX objects to perform verification with Chrome and Firefox.

“This shows that the attacker has expanded his target base, and is interested in the software itself and not just their ActiveX objects. Based on this change, we can expect them to start using attack vectors other than ActiveX.”

Trend Micro published a blog post with analysis report and comparison between the previous and new script.

Also Read

Web Hosting Company Domainfactory Hacked – Customers Sensitive Personal Data Leaked

Massive MyHeritage Data Breach – 92 Million Users Sensitive Data Leaked

Hackers can Bypass Two-Factor Authentication with Phishing Attack

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

VMware Aria Operations Vulnerabilities Allow Attackers to Perform Admin-Level Actions

VMware has released a critical security advisory, VMSA-2025-0003, addressing multiple vulnerabilities in VMware Aria Operations for…

27 minutes ago

Malware Discovered in Healthcare Patient Monitors, Traced to Chinese IP Address

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory regarding multiple vulnerabilities…

1 hour ago

Jailbreaking DeepSeek: Researchers Reveal Three New Methods to Override LLM Safety

Researchers at Palo Alto Networks' Unit 42 have revealed a troubling surge in large language…

1 hour ago

Phorpiex Botnet Distributes LockBit Ransomware Through Compromised Websites

Cybereason Security Services has published a comprehensive threat analysis highlighting the resurgence of the Phorpiex…

1 hour ago

Critical D-Link Router Flaw Allows Attackers to Take Full Remote Control

A critical unauthenticated Remote Code Execution (RCE) vulnerability has been identified in D-Link's DSL-3788 routers,…

3 hours ago

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of the…

3 hours ago