How Lazarus impersonated Meta to assault a goal in Spain – Week in safety with Tony Anscombe

Video

In the course of the assault, the group deployed a number of instruments, most notably a newly-discovered refined backdoor that ESET named LightlessCan

This week, ESET researchers unveiled their findings about an assault by the North Korea-linked APT group Lazarus that took goal at an aerospace firm in Spain. The group obtained preliminary entry to the corporate’s community after a profitable spearphishing marketing campaign the place they masqueraded as a recruiter for Meta, the corporate behind Fb, Instagram, and WhatsApp, and contacted the sufferer by way of LinkedIn Messaging. In the course of the assault, the group deployed a number of instruments, most notably a newly-discovered refined backdoor that ESET named LightlessCan.

Be taught extra in regards to the backdoor and the assault’s mechanics within the video and ensure to offer the complete blogpost a learn right here:

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

Join with us on Facebook, Twitter, LinkedIn and Instagram.


Author:
Date: 2023-09-29 09:00:00

Source link

spot_imgspot_img

Subscribe

Related articles

Navigating the following horizon of SIM know-how

With that, we come to the top of this...

New Backdoor Focusing on European Officers Linked to Indian Diplomatic Occasions

Feb 29, 2024NewsroomCyber Espionage / Malware A beforehand undocumented risk...
spot_imgspot_img
Alina A, Toronto
Alina A, Torontohttp://alinaa-cybersecurity.com
Alina A, an UofT graduate & Google Certified Cyber Security analyst, currently based in Toronto, Canada. She is passionate for Research and to write about Cyber-security related issues, trends and concerns in an emerging digital world.

LEAVE A REPLY

Please enter your comment!
Please enter your name here