The first IT supply chain attack conducted by Lazarus involved a network of a South Korean security vendor. Dissecting Recent IT Supply Chain Attacks by Lazarus Nevertheless, Kaspersky research discovered in June that the APT group was leveraging MATA for cyberespionage. Historically, cybercriminals have used MATA to spread ransomware and exfiltrate customer databases in several industries. For the record, such MATA malware framework contains the potential to target three operating systems, namely Linux, Windows, and macOS. Lazarus hacking group – the advanced persistent threat (APT) group – conducts IT supply chain attacks through its multi-platform MATA framework. Leveraging Multi-Platform MATA Framework for Cyberespionage Remember, it is essential to gather information and evidence to follow legal action after containing a threat. Get our specialized digital forensics services to discover the root cause of your case. For the sake of your information, BlindingCan is the North Korean Remote Access Trojan (RAT). It refers to leveraging a new variant of the BlindingCan backdoor in these attacks. Kaspersky researchers state that the group has built IT supply chain capabilities with an upgraded DeathNote malware cluster. In the previous month of May, the same group breached a Latvian IT vendor. In this regard, researchers at cybersecurity company Kaspersky have recently claimed that the Lazarus group breached a South Korean think tank in June. It has embarked on a journey of expanding its IT supply chain attack capabilities. North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |