Lazarus hackers target engineers using malware-laced job ads
The notorious hacking group has returned with a new phishing campaign in the US and Europe
Security researchers have discovered a new phishing campaign targeting engineering job candidates and employees in classified engineering roles within the US and Europe.
According to a blog post by researchers at AT&T Cybersecurity, the activity has been attributed to the Lazarus hacking group and has been active over the last few months.
Researchers said that several documents were identified by Twitter users between May to June 2021 as being linked to the Lazarus group. Documents observed in previous campaigns lured victims with job opportunities for Boeing and BAE systems.
These documents attempted to impersonate new defense contractors and engineering companies like Airbus, General Motors (GM), and Rheinmetall. All of these documents contain macro malware, which has been developed and improved during the course of this campaign and from one target to another, according to the researchers.
“The core techniques for the three malicious documents are the same, but the attackers attempted to reduce the potential detections and increase the faculties of the macros,” they said.
The first two documents from early May 2021 were related to a German Engineering company focused on the defense and automotive industries, Rheinmetall. A second malicious document appears to include more elaborate content, which may have resulted in the documents going unnoticed by victims.
The secure cloud configuration imperative
The central role of cloud security posture managementWatch now
After the Rheinmetall document was observed, a similar document emerged targeting General Motors. The characteristics of this were very similar to the previous one, but with minor updates in the C&C communication process, according to researchers.
In early June, a month after the first document of this campaign was observed, a new one was identified targeting Airbus. This time, the C&C communications were very similar to the previous iteration of the document; however, the execution and injection processes were different.
Researchers said that this new activity was in line with the Lazarus’ past campaigns and is not expected to be the last.
“Attack lures, potentially targeting engineering professionals in government organizations, showcase the importance of tracking Lazarus and their evolution," they said.
"We continue to see Lazarus using the same tactic, techniques, and procedures that we have observed in the past, such as using Microsoft Office documents that download remote templates, Microsoft Office Macros, and compromised third party infrastructure to host the payloads and proxy C&C traffic through."
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download