How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe

Cyber Security

Video

During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan

This week, ESET researchers unveiled their findings about an attack by the North Korea-linked APT group Lazarus that took aim at an aerospace company in Spain. The group obtained initial access to the company’s network after a successful spearphishing campaign where they masqueraded as a recruiter for Meta, the company behind Facebook, Instagram, and WhatsApp, and contacted the victim via LinkedIn Messaging. During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan.

Learn more about the backdoor and the attack’s mechanics in the video and make sure to give the full blogpost a read here:

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

Connect with us on FacebookTwitterLinkedIn and Instagram.

Products You May Like

Articles You May Like

INC Ransom Claims Cyber-Attack on UK Children’s Hospital
Cisco Warns of Exploitation of Decade-Old ASA WebVPN Vulnerability
Ransomware Attack Disrupts Operations at US Contractor ENGlobal
Wanted Russian Hacker Linked to Hive and LockBit Ransomware Arrested
Researchers Discover “Bootkitty” – First UEFI Bootkit Targeting Linux Kernels

Leave a Reply

Your email address will not be published. Required fields are marked *