McAfee uncovers 'aggressive' Bitcoin-stealing phishing campaign by the Lazarus cyber crooks
Dubbed HaoBao, is said to be a 'sophisticated malware with long-term impact'
McAfee's Advanced Threat Research (ATR) analysts have uncovered an "aggressive" Bitcoin-stealing phishing campaign that it believes to be by the notorious Lazarus cyber crooks.
This new campaign, dubbed HaoBao, is said to be a "sophisticated malware with long-term impact", resuming Lazarus' work of phishing emails, posed as employee recruitment.
However, the new malware variant now targets Bitcoin users and global financial organisations, McAfee said, so when victims open malicious documents attached to the emails, the malware scans for Bitcoin activity and then establishes a "dropped implant" for long-term data-gathering.
"HaoBao targets and never-before-seen implants signal to McAfee ATR an ambitious campaign by Lazarus to establish cryptocurrency cybercrime at a sophisticated level," McAfee said.
The Lazarus group targeted individuals in early 2017 with a campaign of spear phishing emails impersonating job recruiters which contained malicious documents. It lasted from April to October and used job descriptions relevant to target organisations, in both English and Korean language, with the ultimate goal of gaining access to the target's environment and obtain key military program insight or steal money.
Security researchers thought that was the end of the Lazarus campaign, and it was. Until 15 January this year, when McAfee ATR discovered a malicious document distributed via a Dropbox account and masquerading as a job recruitment for a Business Development Executive located in Hong Kong for a big multi-national bank.
McAfee said the discovery was the mark of a new Lazarus campaign, as it utilises techniques, tactics and procedures observed in 2017.
"This document had the last author Windows User' and was created 16 January, 2018 with Korean language resources," the security research team said. "Several additional malicious documents with the same author appeared between January 16 through January 24, 2018."
McAfee ATR analysis also noted that these dropped implants have never been seen before in the wild and have not been used in previous Lazarus campaigns from 2017. The campaign also deploys a one-time data gathering implant that relies upon downloading a second stage to gain persistence, the security experts said.
"The implants contain a hardcoded word "haobao" that is used as a switch when executing from the Visual Basic macro," McAfee added. "This campaign is tailored to identifying those who are running Bitcoin-related software through specific system scans."
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Evaluate your order-to-cash process
15 recommended metrics to benchmark your O2C operationsDownload now
AI 360: Hold, fold, or double down?
How AI can benefit your businessDownload now
Getting started with Azure Red Hat OpenShift
A developer’s guide to improving application building and deployment capabilitiesDownload now