How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe

Cyber Security

Video

During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan

This week, ESET researchers unveiled their findings about an attack by the North Korea-linked APT group Lazarus that took aim at an aerospace company in Spain. The group obtained initial access to the company’s network after a successful spearphishing campaign where they masqueraded as a recruiter for Meta, the company behind Facebook, Instagram, and WhatsApp, and contacted the victim via LinkedIn Messaging. During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan.

Learn more about the backdoor and the attack’s mechanics in the video and make sure to give the full blogpost a read here:

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

Connect with us on FacebookTwitterLinkedIn and Instagram.

Products You May Like

Articles You May Like

The hacker’s toolkit: 4 gadgets that could spell security trouble
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
10,000 Customers’ Data Exposed in UK Government Breaches
SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike
How to inspire the next generation of scientists | Unlocked 403: Cybersecurity podcast

Leave a Reply

Your email address will not be published. Required fields are marked *