Sunday, May 25, 2025
HomeAndroidLazarus Hackers Group Attack Financial Organizations using a Powerful Backdoor

Lazarus Hackers Group Attack Financial Organizations using a Powerful Backdoor

Published on

SIEM as a Service

Follow Us on Google News

Widely active cyber criminal group Lazarus targeting financial organizations across Latin America by installing a backdoor into the targeting systems.

Same hacking groups already targeted various financial organization around the world using various advanced tools and techniques.

Recent activities by this Lazarus APT group hits the cryptocurrency exchanges using fake installer and macOS malware using variously sophisticated techniques.

- Advertisement - Google News

Also, they breach bank networks and compromises the switch application servers handling ATM transactions in a very recent attack in this November.

Very recent attack detected in on September 19, 2018, from several machines that contain a backdoor which is already used in previous attack 2017 using a similar FileTokenBroker.dll.

New attacks method of launching, function, the loading component is very similar to both current and previous incidents.

How Does this Backdoor Works

There are 3 major components are involved with this backdoor’s in a current module that distributing the Lazarus cyber criminals groups.

Initially, a first component AuditCred.dll/ROptimizer.dll used to launch as a service, second component Msadoz<n>.dll is the main backdoor, Third component Auditcred.dll.mui/rOptimizer.dll.mui is an encrypted configuration file.

Loader installs its component in the different machine once it infects the targeted machine also it using different names such as AuditCred and ROptimizer on a different machine with the same capability.

Second component Msadoz<n>.dll load & encrypted to act as the main backdoor into memory.

According to Trend Micro report, if successfully installed, this particular backdoor poses quite a threat to its target. It is capable of the following functions:

  • Collect file/folder/drive information
  • Download files and additional malware
  • Launch/terminate/enumerate process
  • Update configuration data
  • Delete files
  • Inject code from files to other running process
  • Utilize proxy
  • Open reverse shell
  • Run in passive mode — instead of actively connecting to the command and control (C&C) server, the backdoor will open and listen to a port then receive commands through it.

Once the backdoor successfully launched then the configuration file will connect to the command & control server in order to perform various malicious activities and share the stolen data.

The backdoors they are deploying are difficult to detect and a significant threat to the privacy and security of enterprises, allowing attackers to steal information, delete files, install malware, and more. Researchers said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can check the Vulnerability Management Analysis to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...