Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
20 résultats taggé Lazarus  ✕
From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic https://blog.sekoia.io/clickfake-interview-campaign-by-lazarus/
01/04/2025 11:54:41
QRCode
archive.org
thumbnail

Discover how Lazarus leverages fake job sites in the ClickFake Interview campaign targeting crypto firms using the ClickFix tactic.

sekoia EN 2025 ClickFake Interview ClickFix Lazarus
Astrill VPN: Silent Push Publicly Releases New IPs on VPN Service Heavily Used by North Korean Threat Actors https://www.silentpush.com/blog/astrill-vpn/
03/03/2025 11:16:58
QRCode
archive.org
thumbnail

Silent Push reveals Astrill VPN is still being heavily used by NK Lazarus Group threat actors to hide their IP addresses during attacks

silentpush EN205 Astrill VPN Lazarus North-Korea
Stealthy Attributes of APT Lazarus: Evading Detection with Extended Attributes https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/
14/11/2024 00:02:10
QRCode
archive.org

APT Lazarus has begun attempting to smuggle code using custom extended attributes.

Extended attributes are metadata that can be associated with files and directories in various file systems. They allow users to store additional information about a file beyond the standard attributes like file size, timestamps, and permissions.

group-ib EN 2024 Extended attributes macos Smuggling APT Lazarus
Windows 0-day was exploited by North Korea to install advanced rootkit https://arstechnica.com/security/2024/08/windows-0-day-was-exploited-by-north-korea-to-install-advanced-rootkit/
21/08/2024 21:01:00
QRCode
archive.org
thumbnail

FudModule rootkit burrows deep into Windows, where it can bypass key security defenses.

arstechnica EN 2024 FudModule rootkit Lazarus rootkit CVE-2024-38193,
Windows driver zero-day exploited by Lazarus hackers to install rootkit https://www.bleepingcomputer.com/news/microsoft/windows-driver-zero-day-exploited-by-lazarus-hackers-to-install-rootkit/
20/08/2024 07:11:59
QRCode
archive.org
thumbnail

The notorious North Korean Lazarus hacking group exploited a zero-day flaw in the Windows AFD.sys driver to elevate privileges and install the FUDModule rootkit on targeted systems.
#BYOVD #Bring #CVE-2024-38193 #Driver #Group #Lazarus #Microsoft #Own #Vulnerability #Your #Zero-Day

bleepingcomputer EN 2024 Your Lazarus Own BYOVD Driver Zero-Day Vulnerability Bring CVE-2024-38193 Group Microsoft
N. Korean hacking group stole massive amount of personal info from S. Korean court computer network https://m-en.yna.co.kr/view/AEN20240511001900320?ref=news.risky.biz
15/05/2024 11:29:45
QRCode
archive.org
thumbnail

A North Korean hacking group had stolen a massive amount of personal information from a South Korean court computer network, probe results showed on Saturday.

A total of 1,014 gigabytes worth of data and documents were leaked from Seoul's court computer network between January 2021 and February 2023 by the hacking group, presumed to be Lazarus, according to the joint probe by the police, the prosecution and the National Intelligence Service.

m-en.yna.co.kr North-Korea stolen Seoul Lazarus Court South-Korea
Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day - Avast Threat Labs https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
29/02/2024 09:25:00
QRCode
archive.org
thumbnail

The Lazarus Group is back with an upgraded variant of their FudModule rootkit, this time enabled by a zero-day admin-to-kernel vulnerability for CVE-2024-21338. Read this blog for a detailed analysis of this rootkit variant and learn more about several new techniques, including a handle table entry manipulation technique that directly targets Microsoft Defender, CrowdStrike Falcon, and HitmanPro.

avast EN 2024 Lazarus FudModule CVE-2024-21338 vulnerability
Hackers stole $2 billion in crypto in 2023, data shows https://techcrunch.com/2023/12/26/hackers-stole-2-billion-in-crypto-in-2023-data-shows/
30/12/2023 14:05:18
QRCode
archive.org
thumbnail

Data shows hackers stole around $2 billion in crypto this year, according to data analyzed by blockchain security firms.

TechCrunch EN 2023 stole hackers cyberattacks crypto Lazarus DeFi Finance
Diamond Sleet supply chain compromise distributes a modified CyberLink installer https://www.microsoft.com/en-us/security/blog/2023/11/22/diamond-sleet-supply-chain-compromise-distributes-a-modified-cyberlink-installer/
29/11/2023 11:39:24
QRCode
archive.org
thumbnail

Microsoft has uncovered a supply chain attack by the threat actor Diamond Sleet (ZINC) involving a malicious variant of an application developed by CyberLink Corp. This malicious file is a legitimate CyberLink application installer that has been modified to include malicious code that downloads, decrypts, and loads a second-stage payload. The file, which was signed using a valid certificate issued to CyberLink Corp., is hosted on legitimate update infrastructure owned by the organization.

microsoft EN Lazarus Supply-chain-attack CyberLink
New macOS 'KandyKorn' malware targets cryptocurrency engineers https://www.bleepingcomputer.com/news/security/new-macos-kandykorn-malware-targets-cryptocurrency-engineers/
05/11/2023 11:22:34
QRCode
archive.org

A new macOS malware dubbed 'KandyKorn' has been spotted in a campaign attributed to the North Korean Lazarus hacking group, targeting blockchain engineers of a cryptocurrency exchange platform.

The attackers impersonate members of the cryptocurrency community on Discord channels to spread Python-based modules that trigger a multi-stage KandyKorn infection chain.

Elastic Security discovered and attributed the attacks to Lazarus based on overlaps with past campaigns concerning the employed techniques, network infrastructure, code-signing certificates, and custom Lazarus detection rules.

bleepingcomputer EN 2023 macOS Lazarus Discord Python-based cryptocurrency engineers Targeted
A cascade of compromise: unveiling Lazarus' new campaign https://securelist.com/unveiling-lazarus-new-campaign/110888/
27/10/2023 08:48:29
QRCode
archive.org
thumbnail

We unveil a Lazarus campaign exploiting security company products and examine its intricate connections with other campaigns

securelist EN 2023 Backdoor Lazarus Malware-Descriptions SIGNBT
Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company https://www.welivesecurity.com/en/eset-research/lazarus-luring-employees-trojanized-coding-challenges-case-spanish-aerospace-company/
30/09/2023 00:18:33
QRCode
archive.org

ESET researchers uncover a Lazarus attack against an aerospace company in Spain, where the group deployed several tools, including a publicly undocumented backdoor we named LightlessCan.

welivesecurity 2023 ESET Spain LightlessCan Lazarus lure aerospace challenges
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack/
21/04/2023 08:43:29
QRCode
archive.org
thumbnail

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the 3CX attack was carried out by Lazarus.

welivesecurity EN 2023 3CX Lazarus Operation DreamJob
Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack | Securelist https://securelist.com/gopuram-backdoor-deployed-through-3cx-supply-chain-attack/109344/
04/04/2023 20:43:33
QRCode
archive.org
thumbnail

A DLL named guard64.dll, which was loaded into the infected 3CXDesktopApp.exe process, was used in recent deployments of a backdoor that we dubbed “Gopuram” and had been tracking internally since 2020.

securelist APT Backdoor Data-theft Lazarus Malware-Descriptions Gopuram guard64.dll 3CX
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector https://labs.withsecure.com/publications/no-pineapple-dprk-targeting-of-medical-research-and-technology-sector
02/02/2023 15:16:56
QRCode
archive.org
thumbnail

During Q4 2022, WithSecure™ detected and responded to a cyber attack conducted by a threat actor that WithSecure™ have attributed with high confidence to an intrusion set referred to as Lazarus Group. Attribution with high confidence was based off of overlapping techniques tactics and procedures as well as an operational security mistake by the threat actor. Amongst technical indications, the incident observed by WithSecure™ also contains characteristics of recent campaigns attributed to Lazarus Group by other researchers.

WithSecure 2023 EN Case-study Report Lazarus attack
ZetaNile: Open source software trojans from North Korea https://www.reversinglabs.com/blog/zetanile-open-source-software-trojans-from-north-korea
28/12/2022 11:38:24
QRCode
archive.org
thumbnail

ReversingLabs Malware Researcher Joseph Edwards takes a deep dive into ZetaNile, a set of open-source software trojans being used by Lazarus/ZINC.

reversinglabs EN 2022 ZetaNile Malware deepdive apt Lazarus ZINC open-source trojans
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium https://www.welivesecurity.com/2022/09/30/amazon-themed-campaigns-lazarus-netherlands-belgium/
02/10/2022 12:32:50
QRCode
archive.org
thumbnail

ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers.

welivesecurity EN 2022 Lazarus report campaign Netherlands Belgium spearphishing
Lazarus ‘Operation In(ter)ception’ Targets macOS Users Dreaming of Jobs in Crypto https://www.sentinelone.com/blog/lazarus-operation-interception-targets-macos-users-dreaming-of-jobs-in-crypto/
28/09/2022 15:24:54
QRCode
archive.org
thumbnail

First Coinbase, now Crypto.com. Lazarus campaign targets more crypto exchange platform job seekers with multi-stage malware.

sentinelone EN 2022 Lazarus Lazarus-Group crypto macOS operation APT38
MagicRAT: Lazarus’ latest gateway into victim networks https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html
08/09/2022 23:21:24
QRCode
archive.org
thumbnail
  • Cisco Talos has discovered a new remote access trojan (RAT) we're calling "MagicRAT," developed and operated by the Lazarus APT group, which the U.S. government believes is a North Korean state-sponsored actor.
  • Lazarus deployed MagicRAT after the successful exploitation of vulnerabilities in VMWare Horizon platforms.
  • We've also found links between MagicRAT and another RAT known as "TigerRAT," disclosed and attributed to Lazarus by the Korean Internet & Security Agency (KISA) recently.
  • TigerRAT has evolved over the past year to include new functionalities that we illustrate in this blog.
talosintelligence EN 2022 MagicRAT Lazarus Lazarus-Group North-Korea TigerRAT RAT
Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies | WeLiveSecurity https://www.welivesecurity.com/2020/06/17/operation-interception-aerospace-military-companies-cyberspies/
18/08/2022 08:58:19
QRCode
archive.org
thumbnail

ESET research uncovers attacks against several high-profile aerospace and military companies in Europe and the Middle East, with several hints suggesting a possible link to the Lazarus group.

welivesecurity EN 2022 Lazarus-Group military Europe Lazarus Operation North-Korea
4560 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio