How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe

Cyber Security

Video

During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan

This week, ESET researchers unveiled their findings about an attack by the North Korea-linked APT group Lazarus that took aim at an aerospace company in Spain. The group obtained initial access to the company’s network after a successful spearphishing campaign where they masqueraded as a recruiter for Meta, the company behind Facebook, Instagram, and WhatsApp, and contacted the victim via LinkedIn Messaging. During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan.

Learn more about the backdoor and the attack’s mechanics in the video and make sure to give the full blogpost a read here:

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

Connect with us on FacebookTwitterLinkedIn and Instagram.

Products You May Like

Articles You May Like

Four REvil Ransomware Members Sentenced in Rare Russian Cybercrime Convictions
CloudScout: Evasive Panda scouting cloud services
Fortinet Confirms Exploitation of Critical FortiManager Zero-Day Vulnerability
Irish Data Protection Watchdog Fines LinkedIn $336m
Embargo ransomware: Rock’n’Rust

Leave a Reply

Your email address will not be published. Required fields are marked *