Connect with us

Hi, what are you looking for?

HEADLINES

Kaspersky Lab helps disrupt Lazarus Group cyber-attacks

The attackers are believed to be behind the attack on Sony Pictures Entertainment in 2014, and operation DarkSeoul that targeted media and financial institutions in 2013.

Together with Novetta and other partners, Kaspersky Lab announced its contribution to Operation Blockbuster, which aimed to disrupt the activity of the Lazarus Group – a malicious entity responsible for data destruction as well as conventional cyber-espionage operations against multiple companies around the world.

Kaspersky

The attackers are believed to be behind the attack on Sony Pictures Entertainment in 2014, and operation DarkSeoul that targeted media and financial institutions in 2013.

After a devastating attack against Sony Pictures Entertainment (SPE) in 2014, Kaspersky Lab’s Global Research and Analysis Team (GReAT) began its investigation into samples of the Destover malware publicly named as used in the attack. This led to wider research into a cluster of related cyber-espionage and cyber-sabotage campaigns targeting financial institutions, media stations, and manufacturing companies, among others.

Based on the common characteristics of the different malware families, the company’s experts were able to group together tens of isolated attacks and determine that they all belong to one threat actor, as other participants in Operation Blockbuster confirmed in their own analysis.

Advertisement. Scroll to continue reading.

The Lazarus Group threat actor was active several years before the SPE incident, and it appears that it is still active.

Kaspersky Lab and other Operation Blockbuster research confirms a connection between malware used in various campaigns, such as Operation DarkSeoul against Seoul-based banks and broadcasters, Operation Troy targeting military forces in South Korea, and the Sony Pictures incident.

During the investigation, Kaspersky Lab researchers exchanged preliminary findings with AlienVault Labs. Eventually researchers from the two companies decided to unite efforts and conduct a joint investigation.

Simultaneously, the activity of the Lazarus Group was being investigated by many other companies and security specialists. One of these companies, Novetta started an initiative aimed at publishing the most extensive and actionable intelligence on the activity of the Lazarus Group.

As part of Operation Blockbuster, together with Novetta, AlienVault Labs, and other industry partners, Kaspersky Lab is publishing its findings for the benefit of the wider public.

Advertisement. Scroll to continue reading.

By analyzing multiple samples of malware spotted in different cyber-security incidents and creating special detection rules, Kaspersky Lab, AlienVault and other Operation Blockbuster specialists were able to identify a number of attacks as having been conducted by the Lazarus Group.

The link from multiple samples to a single group was found during the analysis of methods used by this actor. In particular, it was discovered that the attackers were actively re-using code –borrowing fragments of code from one malicious program to use in another.

Besides that, researchers were able to spot similarities in the modus operandi of attackers.
While analyzing artefacts from different attacks, they discovered that droppers – special files used to install different variations of a malicious payload – all kept their payloads within a password-protected ZIP archive.

The password for archives used in different campaigns was the same and was hardcoded inside the dropper. The password protection was implemented in order to prevent automated systems from extracting and analyzing the payload, but in reality it just helped researchers to identify the group.
A special method used by the criminals to try to wipe traces of their presence from an infected system, along with some techniques they used to evade detection by anti-virus products also gave researchers additional means of clustering related attacks.

Eventually tens of different targeted attacks, whose operators had been considered unknown, were linked to a single threat actor.

Advertisement. Scroll to continue reading.

The analysis of samples’ compilation dates showed that the earliest might have been compiled as long ago as 2009, five years before the infamous attack against Sony.

The number of new samples has grown dynamically since 2010. This characterizes the Lazarus Group as a stable, longstanding threat actor.

Based on metadata extracted from investigated samples, most of the malicious programs used by the Lazarus Group appear to have been compiled during the working hours of GMT+8 – GMT+9 time zones.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

ELECTRONICS

In this guide, we'll explore different types of security locks for doors, their features, and how they contribute to bolstering the safety of your...

HEADLINES

The cybersecurity landscape is fast changing, and businesses across all industries as well as consumers are facing evolving threats to their data and privacy....

HEADLINES

Pondering on the significant events and trends that shaped the financial threats’ sector in 2021, Kaspersky researchers have forecasted several important tendencies expected to...

HEADLINES

As organizations worldwide slow down for the holidays as well as find themselves in work environment transitions - with many returning to pre-pandemic in-office...

HEADLINES

Deep learning models have reached the point where they can train themselves to enable security systems to predict threats before they happen.

HEADLINES

For the first time ever last year, companies across the world rushed to pivot online as the pandemic spread across the world. In a...

SOFTWARE

MicroWorld's latest offering aims to reinvent cybersecurity in the face of an ever-evolving threat landscape, especially in light of the ongoing pandemic. The cyber...

HEADLINES

According to WorldRemit, there are four industry-wide scams that Filipinos should be aware of this 2021: “email scams, online dating scams, shopping scams and...

Advertisement