Lazarus Continues to Evolve Tactics with Shift to Linux Malware

by | Apr 21, 2023 | News

Premium Content

Patreon
Subscribe to Patreon to watch this episode.
Reading Time: 3 Minutes

North Korean threat group Lazarus targets Linux users in Operation DreamJob, responsible for 3CX attack confirmed by ESET and Mandiant.

North Korean threat group Lazarus, notorious for its high-profile cyber attacks, has expanded its Operation DreamJob campaign to target Linux users with malware for the first time. ESET researchers discovered this new targeting method, confirming with high confidence that Lazarus was responsible for the recent supply-chain attack on VoIP provider 3CX. The attack was discovered in March 2023 and compromised multiple companies using the trojanized version of the 3CX client, resulting in the installation of information-stealing trojans.

According to Mandiant, the 3CX breach was linked to North Korean threat actors after an employee installed trojanized trading software from Trading Technologies, which had also been compromised in another North Korean supply-chain attack. Mandiant’s investigation further confirms the findings of multiple cybersecurity companies, who previously suspected Lazarus to be responsible for the 3CX attack.

See Also: So you want to be a hacker?
Offensive Security, Bug Bounty Courses

Operation DreamJob

As part of Operation DreamJob, Lazarus targets individuals who work in software or DeFi platforms with fake job offers on social media platforms, such as LinkedIn. ESET discovered that Lazarus distributes a ZIP archive named “HSBC job offer.pdf.zip” through spearphishing or direct messages on LinkedIn. The archive contains a Go-written Linux binary, which uses a Unicode character on its name to make it appear like a PDF. The malware, known as “OdicLoader,” displays a decoy PDF while simultaneously downloading a second-stage malware payload called “SimplexTea” from a private repository hosted on the OpenDrive cloud service.

The decoy PDF displayed to the targetThe decoy PDF displayed to the target (ESET)

ESET found that SimplexTea is very similar in functionality, encryption techniques, and hardcoded infrastructure used with Lazarus’ Windows malware, “BadCall,” and the macOS variant, “SimpleSea.” ESET also discovered an earlier variant of SimplexTea, called “sysnetd,” on VirusTotal. This earlier variant is similar to the mentioned backdoors but written in C, and it loads its configuration from a file named /tmp/vgauthsvclog, used by the VMware Guest Authentication service. This suggests that the targeted system may be a Linux VMware virtual machine.

Lazarus' latest attack chainLazarus’ latest attack chain against Linux targets (ESET)

Lazarus’ shift

Lazarus’ shift to Linux malware and the 3CX attack demonstrate their ever-evolving tactics, now supporting all major operating systems, including Windows and macOS. Similar Lazarus Operation DreamJob attacks have led to enormous success for the threat actors, allowing them to steal $620 million from Axie Infinity, and the FBI confirmed Lazarus was behind the $100 million cryptocurrency theft from the Harmony Bridge.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This