Lazarus Group North Korea strikes South Korean software firm

887

Lazarus hacking group aka APT group from North Korea has hit the news headlines for launching a supply chain attack on a software company operating in lines with US Technology firms SolarWinds and Kaseya firms.

Cybersecurity Insiders have learnt that the said group of threat actors have launched a MATA malware attack on the servers of the software company to steal information from the database and encrypt it with ransomware until their demands are met.

MATA is a malicious software framework that can infect machines operating on Windows, Linux and MacOS OSes.

Researchers from Kaspersky have rated the attack version as highly threatening and concluded that the attack was been spread through a trojanized version of apps that were used by victims in an organization.

Putting forth his views, Ariel Jungheit, a senior researcher at Kaspersky, said that the attack highlights the fact that the North Korea Lazarus Hackers has shifted its focus from defense industry and has focused on supply chain attacks.

Note- Lazarus Hackers North Korea has been active since 2010 and has been attributed with many large-scale attacks that includes Operation Troy, Sony Data Breach, Wannacry ransomware attack of 2017 that targeted over 250,000 computers across the world and a sophisticated attack on COVID-19 Vaccine maker AstraZeneca of Britain. US CISA claims that the Lazarus Group members are trained in China and the eligible are offered a six year special education course to be pursued domestically in Kim Chaek University of Technology, Moranbong University and Kim II-Sung University.

Ad
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display