Hjem > Cyber ​​Nyheder > Lazarus Group Hackers Are Behind a Dangerous New Phishing Scam

Lazarus Group Hackere står bag en farlig ny phishing-svindel

Lazarus Group billede

Den berygtede kriminelle kollektivt kendt som Lazarus-gruppen er blevet spottet bag en verdensomspændende phishing-svindel. De er blandt de mest erfarne hacker grupper, der er berygtet for at koordinere masse angreb mod high-end mål. The current campaign is focused against international banks and Bitcoin end users.

The Lazarus Group Strikes Again

Not much is known about the identity of the Lazarus Group hackers. It is believed that they operate from North Korea and are widely known for planning elaborate campaigns against high-profile targets. Deres første angreb var mod sydkoreanske institutioner bruger distribuerede denial-of-service-angreb sikkerhedskopiere i 2009 og 2012. Gruppen er kendt for at bruge store netværk af botnet knudepunkter, som kontrolleres af gruppen. I de fleste tilfælde de er lavet af hackede computere, der er inficeret med malware kode, rekrutterer dem til netværket. Den kombinerede kollektive netværk magt kan være ødelæggende for websteder og computernetværk, når angrebene er lanceret på en gang.

The last noteworthy attack was carried in October 2017 when the Lazarus Group conducted a phishing campaign against users that worked in cryptocurrency establishments. Numerous exchanges and wallet holders were made victims during the attack. The victims received email messages that make use of social engineering tricks and infected documents. The users are instructed to run the attached or linked rich text documents that pose as files of user interest. As soon as they are opened a notification screen asks the users to enable the built-in macros. As soon as this is done a virus infection is downloaded from a hacker server and instituted on the victim computer. As a result a very dangerous Trojan infection followed. It is believed that the hackers were behind some of the largest cryptocurrency exchanges: CoinDash, Bithumb, Veritaseum.

relaterede Story: Cryptocurrency minearbejdere Inficere regering steder Worldwide

The Ongoing Lazarus Group Attack Campaign

The ongoing attack campaign employed by the Lazarus Group is dubbed HaoBao by the security experts that reported it. Like previous campaigns it depends on phishing emails that deliver the malware component. The scam tactic depends on a design that recreates the message as being sent by a Hong Kong based job recruitment company. The actual contents of the emails shows that the senders are looking for Business development executives for hire citing a multi-national bank as their client. The messages contain a link to a Dropbox document that has been identified as malicious. It is a Microsoft Word rich text document which when opened asks the victims to enable the built-in scripts. When this is done the script launches a virus module. The behavior pattern executes the following set of instructions:

  1. The malware downloads a small infection engine that starts to scan the system for any cryptocurrency wallets. They can be of different types and supporting different digital currencies. This usually includes the most popular one such as Monero, Ethereum, Bitcoin, NEO, Ripple and etc.
  2. The next step is to deliver an informationsindsamling component on the compromised machines. It will constantly monitor the infected machine for any major system changes and software installations that are related to cryptocurrency mining.
  3. A network connection is established with the hacker-controlled command and control (C&C) server. This measure is related to the fact that the hackers can remotely scan the systems for changes and variables. Some of the gathered data includes the computer name, currently logged in user and the list of all running applications and system processes. The analysis also shows that the hackers can remotely scan for the presence of certain registry keys.

The security analysts note that one of the new mechanisms devised by the Lazarus Group in their latest malware attack is the quick scan function. The infection commands can scan the systems for the presence of cryptocurrency wallets and support software in a more efficient way than other hacker tools.

Vi minder vore læsere, at de kan beskytte sig mod faren ved at bruge en kvalitet anti-spyware løsning.


Værktøj til fjernelse af malware

Spy Hunter scanner kun detektere trussel. Hvis du ønsker, at truslen skal fjernes automatisk, du nødt til at købe den fulde version af anti-malware værktøj.Læs mere om SpyHunter Anti-Malware værktøj / Sådan fjernes SpyHunter


Martin Beltov

Martin dimitterede med en grad i Publishing fra Sofia Universitet. Som en cybersikkerhed entusiast han nyder at skrive om de nyeste trusler og mekanismer indbrud.

Flere indlæg

Følg mig:

Efterlad en kommentar

Din e-mail-adresse vil ikke blive offentliggjort. Krævede felter er markeret *

Del på Facebook Del
Loading ...
Del på Twitter Tweet
Loading ...
Del på Google Plus Del
Loading ...
Del på Linkedin Del
Loading ...
Del på Digg Del
Del på Reddit Del
Loading ...
Del på Stumbleupon Del
Loading ...