Lazarus Group banner

Lazarus Group’s Deceptive Recruitment Tactics to Target Defense Specialists

2 Mins Read

PUREVPNNewsLazarus Group’s Deceptive Recruitment Tactics to Target Defense Specialists

The Lazarus Group, also known as Hidden Cobra or TEMP.Hermit has been observed employing trojanized Virtual Network Computing (VNC) applications for its ongoing Operation Dream Job campaign, targeting the defense industry and nuclear engineers.

Details about the Tactics

This threat actor attacks job seekers on social media platforms to engage with malicious applications under the offer of job interviews. 

This backdoored application remains inconspicuous to evade detection by behavior-based security systems, only activating when victims select a server from the Trojanized VNC client’s drop-down menu.

Once initiated by the unsuspecting victim, the counterfeit application is designed to fetch additional payloads, including the well-known Lazarus Group malware LPEClient, which can profile compromised hosts.

Lazarus on Rise Again!

The adversary also deploys an updated variant of COPPERHEDGE, a backdoor with a reputation for executing arbitrary commands, conducting system surveillance, and exfiltrating data. 

Additionally, custom-built malware is employed to transmit files of interest to a remote server.

The latest targets of Operation Dream Job include companies directly engaged in defense manufacturing, such as those dealing with radar systems, unmanned aerial vehicles (UAVs), military vehicles, ships, weaponry, and maritime enterprises.

Previously assessed DPRK cyber organizational chart for 2020 by Mandiant.

Operation Dream Job denotes a series of orchestrated attacks by the North Korean hacking group, where potential victims are contacted through suspicious accounts on platforms like LinkedIn, Telegram, and WhatsApp. 

They are lured into installing malware under the guise of attractive job opportunities.

The Lazarus Group is just one of several offensive programs originating from North Korea associated with cyber espionage and financially motivated theft. APT37, APT43, and Kimsuky are some others.

Image description: Bitcoin lure document

There is an evident convergence in infrastructure, tooling, and targeting strategies among North Korean hacking entities, including Andariel, APT38, Lazarus Group, and APT43. 

Commitment to Cyber Security

The sophisticated tactics, methods, and techniques employed by threat actors are proof that the future of cyber security is all about being diligent 24/7. The incidents discussed in the news above is a reminder that we are never secure.

Resilience in the face of cyber-attacks!

author

Anas Hasan

date

October 19, 2023

time

8 months ago

Anas Hassan is a tech geek and cybersecurity enthusiast. He has a vast experience in the field of digital transformation industry. When Anas isn’t blogging, he watches the football games.

Have Your Say!!

Join 3 million+ users to embrace internet freedom

Signup for PureVPN to get complete online security and privacy with a hidden IP address and encrypted internet traffic.