A new campaign by the infamous Lazarus group targeting organisations worldwide has been uncovered by GReAT. The research at the Security Analyst Summit (SAS) revealed a sophisticated APT campaign distributed via malware and spread through legitimate software.
The GReAT team identified a series of cyber incidents that involved targets being infected through legitimate software designed to encrypt web communication using digital certificates. Despite vulnerabilities being reported and patched, organisations worldwide still used the flawed software version, providing an entry point for the infamous Lazarus group.
The adversary exhibited a high level of sophistication, employing advanced evasion techniques and deploying a “SIGNBT” malware to control the victim. They also applied the already well-known LPEClient tool, previously seen targeting defence contractors, nuclear engineers and the cryptocurrency sector. This malware acts as the initial point of infection and plays a crucial role in profiling the victim and delivering the payload. Kaspersky researchers’ observations indicate that LPEClient’s role in this and other attacks aligns with the tactics employed by the Lazarus group, as also seen in the notorious 3CX supply chain attack.
Further investigation revealed that the Lazarus malware had already targeted the initial victim, a software vendor, several times. This pattern of recurring attacks indicates a determined and focused adversary, likely to steal critical source code or disrupt the software supply chain. The threat actor consistently exploited vulnerabilities in the company’s software and broadened their scope by targeting other companies that used the unpatched version. Kaspersky’s Endpoint Security solution identified the threat proactively and prevented further attacks against other targets.
“The Lazarus group’s continued activity is a testament to their advanced capabilities and unwavering motivation. They operate on a global scale, targeting a wide range of industries with a diverse toolkit of methods. This signifies an ongoing and evolving threat that demands heightened vigilance,” said Seongsu Park, Lead Security Researcher at Kaspersky’s Global Research and Analysis Team.
To learn more details about the campaign, visit Securelist.com.
To avoid falling victim to a targeted attack by a known or unknown threat actor, Kaspersky researchers recommend implementing the following measures:
- Regularly update your operating system, applications, and antivirus software to patch known vulnerabilities.
- Be cautious of emails, messages, or calls asking for sensitive information. Verify the sender’s identity before sharing any personal details or clicking on suspicious links.
- Provide your SOC team access to the latest threat intelligence (TI). The Kaspersky Threat Intelligence Portal is a single point of access for the company’s TI, providing cyberattack data and insights gathered by Kaspersky, spanning over 20 years.
- Upskill your cybersecurity team to tackle the latest targeted threats with Kaspersky online training developed by GReAT experts
- For endpoint-level detection, investigation, and timely remediation of incidents, implement EDR solutions such as Kaspersky Endpoint Detection and Response.