Breaking

Lazarus Hackers Perform Social Engineering on Linkedin and Deploy Malware Payloads

The North Korean hacking group known as ‘Lazarus’ recently targeted employees of a Spanish aerospace company through a clever ruse involving fake job opportunities.

This article delves into what happened, why it matters, and how the attackers carried out their operations.

What did Lazarus Hackers do?

Lazarus hackers employed a scheme dubbed “Operation Dreamjob,” where they posed as recruiters, specifically someone named Steve Dawson from Meta (Facebook), on LinkedIn.

The attackers initiated a fraudulent recruitment process that eventually required victims to download a file.

Social Engineering on Linkedin, Source: ESET

Why is the cyber incident very sensitive?

As part of this scheme, victims were coerced into proving their proficiency in C++ programming by downloading quiz executables shared as ISO files. These executables unwittingly dropped an additional payload onto the victim’s machines, enabling the hackers to infiltrate the corporate network.

How did Lazarus Hackers orchestrate the attack?

The payload included the NickelLoader, a malware loader, which deployed two backdoors: a variant of BlindingCan with reduced functionality and a previously undocumented backdoor named ‘LightlessCan.’ LightlessCan, identified as a successor to BlindingCan, offers enhanced functionality and stealth by mimicking native Windows commands.

Infection chain, Source: ESET

ESET, during their investigation, found that LightlessCan’s payload was encrypted and could only be decrypted in the target’s unique environment. This security measure indicates that Lazarus’ motives extend beyond financial gain, encompassing espionage objectives.

The Lazarus hacking group’s ‘Operation Dreamjob’ highlights the evolving tactics of cybercriminals. Their use of LinkedIn for social engineering and the introduction of LightlessCan as a sophisticated backdoor underscore the need for heightened vigilance among organizations facing threats from this North Korean threat group.

As a predecessor to this attack, the Korean National Police Agency (KNPA) has already issued a warning regarding a network breach at Seoul National University Hospital (SNUH). This breach, attributed to North Korean hackers, occurred in May 2023 and resulted in the illicit acquisition of sensitive medical data and personal information.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago