Monday, December 9, 2024
HomeCryptocurrency hackNorth Korean Hacking Group "Lazarus" Targeting Banks & Bitcoin Users Via Sophisticated...

North Korean Hacking Group “Lazarus” Targeting Banks & Bitcoin Users Via Sophisticated Malware

Published on

SIEM as a Service

A New Malware campaign dubbed HaoBao distributing by North Korean Hacking Group “Lazarus” that specifically targets cryptocurrency and financial organizations via sophisticated cyber Attack.

North Korean hacking group Lazarus actively spreading a huge number of spearphishing Emails and targeting many individuals in Beginning of 2017.

Last year this campaign was heavily targeted military program insight or steal money, from defense contractors to financial institutions, including cryptocurrency exchanges.

- Advertisement - SIEM as a Service

Current scenario distribution targets Bitcoin users and their activities by targets Bitcoin users and gathering sensitive information to steal the bitcoins.

Presently discovered variant indicates that Contacts an IP address/domain that was used to host a malicious document from a Lazarus previous campaign in 2017 and the same malicious document also clearly indicates the Lazarus Resurfaces.

Also Read: AndroRAT – A Remote Access Trojan Compromise Android Devices and Inject Root Exploits

North Korean Hacking Group Lazarus campaign Distribution

Initially, it distributing a spam email campaign that contains a Dropbox account link which pointed to the Malicious document.

  • hxxps://dl.dropboxusercontent[.]com/content_link/AKqqkZsJRuxz5VkEgcguqNE7Th3iscMsSYvivwzAYuTZQWDBLsbUb7yBdbW2lHos/file?dl=1
  • hxxps://www[.]dropbox[.]com/s/q7w33sbdil0i1w5/job description.doc?dl=1

Once victims click the link then the malicious document will be downloaded and the document was created in an old version of Microsoft Word.

The malicious document forced victims to enable the macro after implant launched into the target system.

In this case, Three different document was distributed from same dropbox link.  Firestone with the name lsm.exe contacting  210.122.7.129 which also resolves to worker.co.kr.

The second one has distributed with the name csrss.exe that contacts an IP address 70.42.52.80 which resolves to deltaemis.com and third one communicates to a South Korean IP address 221.164.168.185 which resolves to palgong-cc.co.kr.

Malicious document distributing encrypted payload with embedded in the Visual Basic macro code.

According to McAfee, The VBA Macro code is self-executing and configured to execute when the OLE document (MS Word doc) is opened (via “Sub AutoOpen()”) to collect the system information.

Once it collects all the document, exfiltration of information from the victims and sends it via Command and control server.

Uses the same malicious document structure and similar job recruitment ads as what we observed in past Lazarus campaigns.The techniques, tactics, and procedures align with Lazarus group’s interest in cryptocurrency theft.McAfee said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory

Security researchers have identified a significant vulnerability dubbed "DaMAgeCard Attack" in the new SD...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication

Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to...

Sophisticated Celestial Stealer Targets Browsers to Steal Login Credentials

Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection...