Cyber Security

How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe

Video

During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan

This week, ESET researchers unveiled their findings about an attack by the North Korea-linked APT group Lazarus that took aim at an aerospace company in Spain. The group obtained initial access to the company’s network after a successful spearphishing campaign where they masqueraded as a recruiter for Meta, the company behind Facebook, Instagram, and WhatsApp, and contacted the victim via LinkedIn Messaging. During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan.

Learn more about the backdoor and the attack’s mechanics in the video and make sure to give the full blogpost a read here:

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

Connect with us on FacebookTwitterLinkedIn and Instagram.

Articles You May Like

Warning: 3 Critical Vulnerabilities Expose ownCloud Users to Data Breaches
Meta’s EU ad-free subscription faces early privacy challenge
Cybercriminals Using Telekopye Telegram Bot to Craft Phishing Scams on a Grand Scale
If I’m being honest, I didn’t have what it takes to be a founder
After two ambitious years, TikTok parent ByteDance starts mass layoffs in gaming

Leave a Reply

Your email address will not be published. Required fields are marked *