• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Lazarus Group Targets South Korean Finance Firm Via Zero-Day Flaw

You are here: Home / Cyber Security News / Lazarus Group Targets South Korean Finance Firm Via Zero-Day Flaw

The North Korean threat actor identified as Lazarus Group has been spotted exploiting flaws in unnamed program to achieve access to a South Korean finance organization two times last calendar year. The news arrives from security researchers at Asec, who released an advisory about the assaults on Tuesday.

The firm recorded the 1st of the attacks in May perhaps 2022, although the next occurred in Oct of the very same yr. Both equally operations reportedly relied on the identical zero-working day vulnerability.

“During the infiltration in May 2022, the affected enterprise was utilizing a susceptible edition of a certification system that was frequently utilised by general public establishments and universities,” reads the Asec advisory.

“After the incident, they up to date all of their computer software to their most current versions. Having said that, the Lazarus group utilised the software’s zero-day vulnerability to have out their infiltration this time.”

Asec stated that, right after finding the flaw, it disclosed it to the Korea Internet & Security Agency (KISA).

“Since the vulnerability has not been absolutely verified however and a program patch has not been unveiled, we will be omitting the maker and software package from this publish,” Asec wrote.

From a complex standpoint, the danger actors used a Carry Your Have Vulnerable Driver (BYOVD) approach to exploit the software’s susceptible driver kernel modules and disable security products and solutions on infected machines.

“Additionally, they would conduct anti-forensic tactics to conceal their malicious behaviors by either altering file names before deleting them or modifying timestamps,” described Asec.

Far more generally, the security scientists mentioned that when the certificate computer software in query is generally utilized in Korea, it does not function auto-updates.

“Since these styles of computer software are not up-to-date routinely, they must be manually patched to the most recent edition or deleted if unused.”

Even more, as the sufferer corporation was re-infiltrated by the similar hacker group making use of a very similar approach, Asec advisable particular guidelines for companies to protect from equivalent attacks.

“Instead of having only submit-attack measures, ongoing checking is necessary to stop recurrences.”

The Asec advisory will come weeks just after Eset researchers linked a payload of the Wslink downloader named WinorDLL64 to Lazarus Group risk actors.

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « US RESTRICT Act Gains Supports, Empowers Biden to Ban Foreign Tech
Next Post: Smash or pass? This computer can tell AllTech.News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.