Friday, February 28, 2025
HomeCyber AttackLazarus hacker Group Attack Defence Industries with custom-made Malware ThreatNeedle

Lazarus hacker Group Attack Defence Industries with custom-made Malware ThreatNeedle

Published on

SIEM as a Service

Follow Us on Google News

Lazarus has now added the defence industry to its growing list of victims. Lazarus is a North Korean hacking group that has been active since 2009. The group has primarily been linked with ransomware campaigns, cyberespionage, and attacks against the cryptocurrency market. 

Researchers at Kaspersky were made aware of the attack on the defence industry when they had responded to an incident, and had discovered a backdoor that was subsequently named ThreatNeedle. The main goal of the backdoor is to extract confidential information and send it to the attackers by moving laterally through the infected networks.

Spearphishing is the method commonly used to deliver ThreatNeedle to the targets. The malicious Word documents are written to sound like urgent communication and updates regarding COVID-19.

ThreatNeedle is installed upon the document being opened, and this allows the attacker to take control of the infected machine.

Though this sounds like a regular malware that infects your system and steals data, it is nothing like it. It is more a malware on steroids than your run of the mill softwares. ThreatNeedle is capable of jumping between internet-facing office networks and restricted access operational technology (OT) networks where mission-critical hardware lives. 

The policies of the victim companies state that under no circumstance should data be able to be transferred between the two networks. However, administrators had the ability to connect to both solely for the purpose of maintenance.

“Lazarus was able to obtain control of administrator workstations and then set up a malicious gateway to attack the restricted network and to steal and extract confidential data from there. Not only were they able to overcome network segmentation, but they did extensive research to create highly personalized and effective spearphishing emails and built custom tools to extract the stolen information to a remote server. With industries still dealing with remote work and, thus, still more vulnerable, it is important that organizations take extra security precautions to safeguard against these types of advanced attacks, Kaspersky said.

Precautions to be taken:

  1. Extensive training to the staff regarding cybersecurity hygiene
  2. Teach and make the staff aware of the internal policies
  3.  Segmenting OT networks from IT networks
  4. Provide the latest threat intelligence to the security teams
  5. Have dedicated OT network security including but not limited to traffic monitoring, analysis, and threat detection.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s...

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s...