North Korean hackers exploit known bug in ‘high-profile’ software vendor

Avatar

Hackers connected to the North Korean government have exploited a vulnerability in a “high-profile” software vendor to target its customers, according to a recent report.

In mid-July, researchers from the cybersecurity firm Kaspersky detected a series of attacks on several victims who were targeted through unidentified security software designed to encrypt web communications using digital certificates.

What was remarkable is that the software flaws exploited by the hackers were not new, yet the targeted company had not patched them despite warnings from the vendor.

Attacks like this one are especially dangerous because exploiting vulnerabilities in high-profile software enables hackers to efficiently spread their malware after initial infections, Kaspersky said.

Researchers attributed the campaign to the infamous North Korean hacker group known as Lazarus. The group has targeted the software vendor that developed the exploited software on multiple occasions, according to the report.

This persistence indicates that the threat actor is determined to steal valuable source code or tamper with the software supply chain, the researchers said.

The report did not name any of the victims or the vulnerabilities exploited by hackers.

Earlier this year, Lazarus reportedly initiated a supply-chain attack on the phone company 3CX, with the aim of installing malware on its clients’ desktops. 3CX provides office phone systems to more than 12 million daily users in over 600,000 companies, including Mercedes-Benz, Coca-Cola, and the United Kingdom’s National Health Service.

In the attack analyzed by Kaspersky, Lazarus’ toolset included the SIGNBT and LPEClient malware strains. The exact method by which the targeted software was exploited to deliver the malware remains unknown.

SIGNBT loader is “equipped with an extensive set of functionalities designed to exert control over the victim’s system.” For example, it can gather information about the victim’s device, such as computer name, product name, operation system details, system uptime, main processor information, time zone, network status, and malware configuration data.

Lazarus has also been observed delivering such tools as LPEClient and credential dumping utilities — tools that steal login details from a system — to the victim devices.

The North Korean threat actor previously used the LPEClient malware, for instance, in an attack against a defense contractor in 2020. The malware usually serves as the initial infection vector, helping hackers collect more information about the victim and facilitating the delivery of additional payloads.

LPEClient is designed to collect victim information and download additional payloads from a remote server.

Since it was last exploited, LPEClient has undergone significant evolution — it now employs advanced techniques to improve its stealth and avoid detection.

“This indicates a continued effort by the threat actors to increase the sophistication and effectiveness of their malware,” the researchers said.

NewsNation-stateMalware
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk
is a freelance reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Internet access severed in Gaza as IDF announces ‘expanding’ ground operation

Next Post

Judge tosses Khashoggi widow’s lawsuit against NSO Group

Related Posts

Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks

Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as 92,000 internet-exposed D-Link network-attached storage (NAS) devices. Tracked as CVE-2024-3272 (CVSS score: 9.8) and CVE-2024-3273 (CVSS score: 7.3), the vulnerabilities impact legacy D-Link products that have reached end-of-life (EoL) status. D-Link, in
Avatar
Read More

Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023

Google on Monday revealed that almost 200,000 app submissions to its Play Store for Android were either rejected or remediated to address issues with access to sensitive data such as location or SMS messages over the past year. The tech giant also said it blocked 333,000 bad accounts from the app storefront in 2023 for attempting to distribute malware or for repeated policy violations. "In 2023,
Avatar
Read More