Article Details
Scrape Timestamp (UTC): 2023-09-29 12:13:36.042
Source: https://thehackernews.com/2023/09/lazarus-group-impersonates-recruiter.html
Original Article Text
Click to Toggle View
Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm. The North Korea-linked Lazarus Group has been linked to a cyber espionage attack targeting an unnamed aerospace company in Spain in which employees of the firm were approached by the threat actor posing as a recruiter for Meta. "Employees of the targeted company were contacted by a fake recruiter via LinkedIn and tricked into opening a malicious executable file presenting itself as a coding challenge or quiz," ESET security researcher Peter Kálnai said in a technical report shared with The Hacker News. The attack is part of a long-standing spear-phishing campaign called Operation Dream Job that's orchestrated by the hacking crew in an attempt to lure employees working at prospective targets that are of strategic interest are enticed with lucrative job opportunities to activate the infection chain. Earlier this March, the Slovak cybersecurity company detailed an attack wave aimed at Linux users that involved the use of bogus HSBC job offers to launch a backdoor named SimplexTea. The ultimate objective of the latest intrusion, which is designed for Windows systems, is the deployment of an implant codenamed LightlessCan. "The most worrying aspect of the attack is the new type of payload, LightlessCan, a complex and possibly evolving tool that exhibits a high level of sophistication in its design and operation, and represents a significant advancement in malicious capabilities compared to its predecessor, BLINDINGCAN," Kálnai said. BLINDINGCAN, also known by the name AIRDRY or ZetaNile, is a feature-rich malware capable of harvesting sensitive information from infiltrated hosts. It all commenced with the target receiving a message on LinkedIn from a fake recruiter working for Meta Platforms, who then sent two coding challenges as part of the supposed hiring process and convinced the victim to execute the test files (named Quiz1.iso and Quiz2.iso) hosted on a third-party cloud storage platform. ESET said the ISO files, which contained malicious binaries Quiz1.exe and Quiz2.exe, were downloaded and executed on a company-provided device, effectively resulting in the self-compromise of the system. Ready to tackle new AI-driven cybersecurity challenges? Join our insightful webinar with Zscaler to address the growing threat of generative AI in cybersecurity. The attack paves the way for an HTTP(S) downloader referred to as NickelLoader, which allows the attackers to deploy any desired program into the memory of the victim's computer, including the LightlessCan remote access trojan and a variant of BLINDINGCAN referred to as miniBlindingCan (aka AIRDRY.V2). LightlessCan comes fitted with support for as many as 68 distinct commands, although in its current version, only 43 of those commands are implemented with some functionality. On tminiBlindingCan's main responsibility is to transmit system information and download files retrieved from a remote server, among others. A noteworthy trait of the campaign is the use of execution guardrails to prevent the payloads from being decrypted and run on any other machine other than that of the intended victim's. "LightlessCan mimics the functionalities of a wide range of native Windows commands, enabling discreet execution within the RAT itself instead of noisy console executions," Kálnai said. "This strategic shift enhances stealthiness, making detecting and analyzing the attacker's activities more challenging."
Daily Brief Summary
North Korea-affiliated Lazarus Group carried out a cyber espionage attack on an unnamed Spanish aerospace company, using a recruiter impersonating a Meta Platforms employee on LinkedIn.
The attack forms part of a campaign dubbed "Operation Dream Job," in which target employees are encouraged to open a malicious executable file pretending to be a coding quiz or challenge.
The payload delivered in the latest attack is a complex tool named LightlessCan, a tool exhibiting considerable sophistication in its design and operation, offering a significant advance over its predecessor, BLINDINGCAN.
To initiate the attack, the victims receive a LinkedIn message from the fake recruiter, who sends two coding challenges via third-party cloud storage platforms, which contain malicious Quiz1.exe and Quiz2.exe files.
Once executed, these files facilitate the introduction of an HTTP(S) downloader called NickelLoader, which can deploy any software into the victim's device memory, including the LightlessCan remote access trojan, and a variant of BLINDINGCAN, miniBlindingCan.
Reflecting its advanced design, LightlessCan can mimic a wide range of Windows commands and has implemented 43 out of 68 possible distinct commands to date.