Lazarus hackers compromise Chile's ATM network through LinkedIn job advert

The hack was facilitated by a fake job interview via the business-orientated social network

Person entering their PIN number into an ATM machine

Chile's ATM network has been compromised by what is believed to be Lazarus, the cybercrime outfit oft-thought to have links to North Korea.

The attack was facilitated by a Redbanc employee who fell for a phishing scam following a job application. Redbanc is the company that manages the interconnecting infrastructure for all of Chile's ATMs.

The employee applied for a job via LinkedIn and then the hiring company, believed to be Lazarus, set up a fake interview with the applicant in Spanish, according to trendTIC.

The applicant was then told to download and install a file named ApplicationPDF.exe, a program that would help with the recruitment process and generate a standard application form.

Instead, this application was a form of malware known as PowerRatankba, a strain previously linked to Lazarus Group, according to Vitali Kremez, director of research at Flashpoint, in an analysis of the executable.

The malware collected information about the employee's computer and sent it back to a remote server so when the attackers realised they had caught a big fish, they could release a PowerShell script in a second stage payload. The computer then acted as an entry point for the attackers to compromise the Redbanc infrastructure.

The attack happened in late December 2018 but has only recently been reported for the first time.

Chilean Senator Felipe Harboe slammed Redbanc for failing to disclose the hack sooner, the company did just that the following day.

The Lazarus hackers are known for their prolific hacks on banks and cryptocurrency exchanges and have remained anonymous and active for some years.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Global ransom DDoS extortionists are retargeting companies
distributed denial of service (DDOS)

Global ransom DDoS extortionists are retargeting companies

22 Jan 2021
Best ransomware removal tools
ransomware

Best ransomware removal tools

22 Jan 2021
Hackers publish over 4,000 files stolen from SEPA in ransomware attack
Security

Hackers publish over 4,000 files stolen from SEPA in ransomware attack

22 Jan 2021
BEC scammers are using Google Forms to identify easy victims
phishing

BEC scammers are using Google Forms to identify easy victims

21 Jan 2021

Most Popular

How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
What is the Raspberry Pi Pico?
Hardware

What is the Raspberry Pi Pico?

21 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021