How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe

Cyber Security

Video

During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan

This week, ESET researchers unveiled their findings about an attack by the North Korea-linked APT group Lazarus that took aim at an aerospace company in Spain. The group obtained initial access to the company’s network after a successful spearphishing campaign where they masqueraded as a recruiter for Meta, the company behind Facebook, Instagram, and WhatsApp, and contacted the victim via LinkedIn Messaging. During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan.

Learn more about the backdoor and the attack’s mechanics in the video and make sure to give the full blogpost a read here:

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

Connect with us on FacebookTwitterLinkedIn and Instagram.

Products You May Like

Articles You May Like

Salt Typhoon Exploited Cisco Devices With Custom Tool to Spy on US Telcos
Fake job offers target software developers with infostealers
Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands
New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now
Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes

Leave a Reply

Your email address will not be published. Required fields are marked *