How Lazarus impersonated Meta to assault a goal in Spain – Week in safety with Tony Anscombe


Video

Throughout the assault, the group deployed a number of instruments, most notably a newly-discovered refined backdoor that ESET named LightlessCan

This week, ESET researchers unveiled their findings about an assault by the North Korea-linked APT group Lazarus that took intention at an aerospace firm in Spain. The group obtained preliminary entry to the corporate’s community after a profitable spearphishing marketing campaign the place they masqueraded as a recruiter for Meta, the corporate behind Fb, Instagram, and WhatsApp, and contacted the sufferer by way of LinkedIn Messaging. Throughout the assault, the group deployed a number of instruments, most notably a newly-discovered refined backdoor that ESET named LightlessCan.

Be taught extra concerning the backdoor and the assault’s mechanics within the video and ensure to present the total blogpost a learn right here:

Lazarus luring staff with trojanized coding challenges: The case of a Spanish aerospace firm

Join with us on FbTwitterLinkedIn and Instagram.



Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top