SGGPO
Kaspersky researchers reveal targeted attack aimed at spreading malware through the company's legitimate software.
Cyber attackers control victims with "SIGNBT" malware |
Kaspersky's Global Research and Analysis Team (GReAT) recently presented findings on a new campaign by the Lazarus hacker group targeting organizations around the world at the Security Analyst Summit (SAS).
The GReAT team discovered a series of cyberattacks in which targets were infected with malware disguised as legitimate software, designed to encrypt web traffic with digital certificates. However, organizations around the world continued to use the flawed software version even after the vulnerabilities were discovered and patched, creating an opportunity for the Lazarus group to carry out cyberattacks.
The cyber attackers controlled victims with the "SIGNBT" malware and used sophisticated evasion techniques to avoid detection, the LPEClient tool was also used in this campaign.
Further investigation revealed that the Lazarus malware repeatedly targeted the software vendor. The frequency of the attacks suggested the hackers’ motivation to disrupt the software supply chain and their determination to steal critical company source code.
Accordingly, the attackers continuously exploited vulnerabilities in the company's software and expanded the spread by targeting other companies using unpatched versions of the software. Kaspersky Endpoint Security solutions detected the threat and provided measures to prevent further attacks.
“The ongoing attacks by the Lazarus group are a testament to the changing tactics and efforts of cybercriminals. They operate globally, targeting multiple industries with sophisticated methods of operation. This shows that the threat is still present and requires everyone to be highly vigilant,” said Seongsu Park, Head of Security Research at the Global Research and Analysis Team (GReAT) at Kaspersky.
Source
Comment (0)