"🚀 Lazarus Group's Ingenious Espionage: Trojanized Coding Challenges 🚀"
The Lazarus Group, known for its North Korean allegiance, has orchestrated a sophisticated espionage campaign against a Spanish aerospace company. The attackers, masquerading as recruiters from Meta, lured employees via LinkedIn into downloading and executing trojanized coding challenges. The initial compromise led to the deployment of a new, publicly undocumented backdoor named LightlessCan, showcasing a significant evolution from its predecessor, BlindingCan. This backdoor mimics native Windows commands, enhancing stealth and evading real-time monitoring. The attack, dubbed Operation DreamJob, aligns with North Korea's long-term objectives of pilfering aerospace technology and know-how, shedding light on the persistent threat landscape aerospace industries face globally. 🌐🔐
Source: ESET Research
Tags: #LazarusGroup #CyberEspionage #TrojanizedCoding #LightlessCan #BlindingCan #OperationDreamJob #AerospaceSecurity #APT #CyberSecurity #NorthKorea
MITRE ATT&CK - Lazarus Group