Lazarus hackers target engineers using malware-laced job ads
The notorious hacking group has returned with a new phishing campaign in the US and Europe
Security researchers have discovered a new phishing campaign targeting engineering job candidates and employees in classified engineering roles within the US and Europe.
According to a blog post by researchers at AT&T Cybersecurity, the activity has been attributed to the Lazarus hacking group and has been active over the last few months.
Researchers said that several documents were identified by Twitter users between May to June 2021 as being linked to the Lazarus group. Documents observed in previous campaigns lured victims with job opportunities for Boeing and BAE systems.
These documents attempted to impersonate new defense contractors and engineering companies like Airbus, General Motors (GM), and Rheinmetall. All of these documents contain macro malware, which has been developed and improved during the course of this campaign and from one target to another, according to the researchers.
“The core techniques for the three malicious documents are the same, but the attackers attempted to reduce the potential detections and increase the faculties of the macros,” they said.
The first two documents from early May 2021 were related to a German Engineering company focused on the defense and automotive industries, Rheinmetall. A second malicious document appears to include more elaborate content, which may have resulted in the documents going unnoticed by victims.
The secure cloud configuration imperative
The central role of cloud security posture managementDownload now
After the Rheinmetall document was observed, a similar document emerged targeting General Motors. The characteristics of this were very similar to the previous one, but with minor updates in the C&C communication process, according to researchers.
In early June, a month after the first document of this campaign was observed, a new one was identified targeting Airbus. This time, the C&C communications were very similar to the previous iteration of the document; however, the execution and injection processes were different.
Researchers said that this new activity was in line with the Lazarus’ past campaigns and is not expected to be the last.
“Attack lures, potentially targeting engineering professionals in government organizations, showcase the importance of tracking Lazarus and their evolution," they said.
"We continue to see Lazarus using the same tactic, techniques, and procedures that we have observed in the past, such as using Microsoft Office documents that download remote templates, Microsoft Office Macros, and compromised third party infrastructure to host the payloads and proxy C&C traffic through."
B2B under quarantine
Key B2C e-commerce features B2B need to adopt to surviveDownload now
The top three IT pains of the new reality and how to solve them
Driving more resiliency with unified operations and service managementDownload now
The five essentials from your endpoint security partner
Empower your MSP business to operate efficientlyDownload now
How fashion retailers are redesigning their digital future
Fashion retail guideDownload now