Lazarus hackers compromise Chile's ATM network through LinkedIn job advert
The hack was facilitated by a fake job interview via the business-orientated social network
Chile's ATM network has been compromised by what is believed to be Lazarus, the cybercrime outfit oft-thought to have links to North Korea.
The attack was facilitated by a Redbanc employee who fell for a phishing scam following a job application. Redbanc is the company that manages the interconnecting infrastructure for all of Chile's ATMs.
The employee applied for a job via LinkedIn and then the hiring company, believed to be Lazarus, set up a fake interview with the applicant in Spanish, according to trendTIC.
The applicant was then told to download and install a file named ApplicationPDF.exe, a program that would help with the recruitment process and generate a standard application form.
Instead, this application was a form of malware known as PowerRatankba, a strain previously linked to Lazarus Group, according to Vitali Kremez, director of research at Flashpoint, in an analysis of the executable.
The malware collected information about the employee's computer and sent it back to a remote server so when the attackers realised they had caught a big fish, they could release a PowerShell script in a second stage payload. The computer then acted as an entry point for the attackers to compromise the Redbanc infrastructure.
The attack happened in late December 2018 but has only recently been reported for the first time.
Chilean Senator Felipe Harboe slammed Redbanc for failing to disclose the hack sooner, the company did just that the following day.
The Lazarus hackers are known for their prolific hacks on banks and cryptocurrency exchanges and have remained anonymous and active for some years.
Choosing a collaboration platform
Eight questions every IT leader should askDownload now
Performance benchmark: PostgreSQL/ MongoDB
Helping developers choose a databaseDownload now
Customer service vs. customer experience
Three-step guide to modern customer experienceDownload now
Taking a proactive approach to cyber security
A complete guide to penetration testingDownload now