Lazarus Group Targets Spanish Aerospace Firm via Meta Impersonation

60 views 2 minutes read

Lazarus Group Targets Spanish Aerospace Firm via Meta Impersonation: The Lazarus Group, a North Korea-linked cyber espionage outfit, has launched a cyber attack against an aerospace company in Spain.

The threat actors posed as a recruiter from Meta (formerly Facebook) to deceive employees into opening malicious files, marking a significant development in their spear-phishing campaign.

Key Takeaways on Lazarus Group Targets Spanish Aerospace Firm via Meta Impersonation:

  • Meta Recruiter Impersonation: Lazarus Group posed as Meta recruiters on LinkedIn to trick employees of a Spanish aerospace firm into downloading malicious files.
  • Operation Dream Job: This attack is part of Operation Dream Job, a spear-phishing campaign designed to lure employees with promising job opportunities to initiate cyberattacks.
  • Advanced Malware: The attackers deployed a sophisticated Windows malware called LightlessCan, showcasing an evolution from their previous tool, BLINDINGCAN.

Meta Impersonation and Cyber Espionage

The Lazarus Group, known for its cyber espionage activities linked to North Korea, has been implicated in a targeted attack on a Spanish aerospace company.

The attackers used a clever ruse by impersonating recruiters from Meta Platforms (formerly Facebook) to infiltrate the organization.

Lazarus Group Targets Spanish Aerospace Firm via Meta Impersonation - messages
Lazarus Group Targets Spanish Aerospace Firm via Meta Impersonation – messages

Operation Dream Job Spear-Phishing

This attack is part of Operation Dream Job, a long-standing spear-phishing campaign orchestrated by the Lazarus Group.

The campaign aims to entice employees of strategic interest organizations with enticing job opportunities, ultimately leading to the activation of malicious payloads.

Evolution of Attacks

Notably, Lazarus Group’s tactics have evolved. In a previous attack, the group used fake HSBC job offers to distribute a Linux backdoor named SimplexTea.

In this recent intrusion targeting Windows systems, their objective was to deploy an implant called LightlessCan.

LightlessCan: A Sophisticated Threat

The most concerning aspect of this attack is the use of LightlessCan. This malware represents a significant advancement in malicious capabilities compared to its predecessor, BLINDINGCAN.

LightlessCan is highly sophisticated and exhibits complex design and operation characteristics.

Attack Execution

The attack began with a LinkedIn message to the target, supposedly from a Meta recruiter. The victim was presented with coding challenges as part of a hiring process. To complete these challenges, the victim was encouraged to execute test files hosted on a third-party cloud storage platform.

These test files, named Quiz1.iso and Quiz2.iso, contained malicious binaries (Quiz1.exe and Quiz2.exe). When executed on a company-provided device, these files compromised the system, allowing the attackers to proceed.

Deployment of Malware

Once the system was compromised, the attackers introduced an HTTP(S) downloader known as NickelLoader. This downloader facilitated the deployment of various programs into the victim’s computer’s memory.

Notably, this included the LightlessCan remote access trojan and a variant of BLINDINGCAN called miniBlindingCan (also known as AIRDRY.V2).

LightlessCan’s Capabilities

LightlessCan is a powerful tool equipped with support for up to 68 distinct commands, with 43 of them currently implemented.

Its functions enable discreet execution within the RAT itself, enhancing stealthiness and making it more challenging to detect and analyze the attacker’s activities.

Strategic Guardrails

One distinctive feature of this campaign is the use of execution guardrails. These mechanisms prevent the payloads from being decrypted and run on any machine other than the intended victim’s, further enhancing the stealthiness of the attack.

Conclusion

The Lazarus Group’s use of Meta impersonation to target a Spanish aerospace firm highlights the group’s evolving tactics in cyber espionage.

The deployment of the sophisticated LightlessCan malware underscores the need for vigilance and robust cybersecurity measures to counter such threats.

About ESET:

ESET is a reputable cybersecurity company known for its expertise in threat research and analysis.

Leave a Comment

About Us

CyberSecurityCue provides valuable insights, guidance, and updates to individuals, professionals, and businesses interested in the ever-evolving field of cybersecurity. Let us be your trusted source for all cybersecurity-related information.

Editors' Picks

Trending News

©2010 – 2023 – All Right Reserved | Designed & Powered by HostAdvocate

CyberSecurityCue (Cyber Security Cue) Logo
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More