Hacker group Lazarus’ new campaign exploits legitimate software

THURSDAY, NOVEMBER 02, 2023

A new campaign by the infamous Lazarus hacker group, targeting organisations worldwide, has been uncovered by Kaspersky's research and analysis team.

The research presented at Security Analyst Summit revealed a sophisticated advanced persistent threat (APT) campaign distributed via malware and spread through legitimate software. APT is a well-resourced adversary engaged in sophisticated malicious cyber activity that is targeted and aimed at prolonged network/system intrusion.

The expert identified a series of cyber incidents that involved targets being infected through legitimate software designed to encrypt web communication using digital certificates.

Despite vulnerabilities being reported and patched, organisations worldwide still used the flawed version of the software, providing an entry point for the infamous Lazarus group.

The adversary exhibited a high level of sophistication, employing advanced evasion techniques and deploying a "SIGNBT" malware to control the victim. They also applied the already well-known LPEClient tool, previously seen targeting defence contractors, nuclear engineers and the cryptocurrency sector.

This malware acts as the initial point of infection and plays a crucial role in profiling the victim and delivering the payload.

Kaspersky researchers' observations indicate that LPEClient's role in this and other attacks aligns with the tactics employed by the Lazarus group, as also seen in the 3CX supply chain attack.

Further investigation revealed that the Lazarus malware had already targeted the initial victim — a software vendor — several times before. This pattern of recurring attacks indicates a determined and focused adversary, likely with an intention is to steal critical source code or disrupt the software supply chain.

The threat actor consistently exploited vulnerabilities in the company's software and broadened their scope by targeting other companies that used the unpatched version of the software.

"The Lazarus group's continued activity is a testament to their advanced capabilities and unwavering motivation. They operate on a global scale, targeting a wide range of industries with a diverse toolkit of methods. This signifies an ongoing and evolving threat that demands heightened vigilance," said Seongsu Park, lead security researcher at Kaspersky's global research and analysis team.

To avoid falling victim to a targeted attack by a known or unknown threat actors, Kaspersky researchers recommend implementing the following measures:

• Regularly update your operating system, applications, and antivirus software to patch any known vulnerabilities.

• Beware of emails, messages, or calls asking for sensitive information. Verify the sender’s identity before sharing any personal details or clicking at suspicious links.

• Provide your security operations centre team with access to the latest threat intelligence.

• Upskill your cybersecurity team to tackle the latest targeted threats.

• For endpoint-level detection, investigation, and timely remediation of incidents, implement endpoint detection and response solutions.