Press ESC to close

Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware

Category Details
Threat Actors – Lazarus Group (DPRK-linked)
Campaign Overview – Targeted nuclear-related organization employees
– Focused on cyber espionage via job-themed lures as part of Operation Dream Job/NukeSped
– Used new modular malware, CookiePlus, for complex infection chains
Target Regions – Employees in nuclear-related organizations
Methodology – Supply chain attacks using trojanized tools (e.g., TightVNC, UltraVNC)
– Spear-phishing with job-related lures
– Lateral movement within networks
Products Targeted – Nuclear-related organization systems
– Aerospace, defense, and cryptocurrency sectors
Malware Reference – CookiePlus (modular malware)
– CookieTime, MISTPEN, RollMid, LPEClient, ServiceChanger, Charamel Loader
Tools Used – Trojanized utilities (e.g., “AmazonVNC.exe”)
– DLL sideloading (e.g., vnclang.dll)
– Charamel Loader for decrypting and executing payloads
Vulnerabilities Exploited – Exploited trust in legitimate tools (e.g., Notepad++ plugins, DirectX-Wrappers)
TTPs – Job-themed social engineering
– Complex infection chains using modular malware
– Exploiting legitimate software tools for malicious purposes
Attribution – Lazarus Group
– DPRK state-sponsored activity
Recommendations – Implement strict application whitelisting and validation of software tools
– Monitor network for lateral movement and unusual communications
– Educate employees on phishing and social engineering risks
Source The Hackers News

Read full article: https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html

The above summary has been generated by an AI language model

Source: TheHackersNews

Published on: December 20, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *