North Korean Lazarus Group is focusing on crypto funds with a brand new spin on an outdated trick

North Korean Lazarus Group is focusing on crypto funds with a brand new spin on an outdated trick

by Jeremy

Microsoft reviews {that a} risk actor has been recognized focusing on cryptocurrency funding startups. A celebration Microsoft has dubbed DEV-0139 posed as a cryptocurrency funding firm on Telegram and used an Excel file weaponized with “well-crafted” malware to contaminate techniques that it then remotely accessed.

The risk is a part of a development in assaults displaying a excessive degree of sophistication. On this case, the risk actor, falsely figuring out itself with faux profiles of OKX staff, joined Telegram teams “used to facilitate communication between VIP shoppers and cryptocurrency change platforms,” Microsoft wrote in a Dec. 6 weblog submit. Microsoft defined:

“We’re […] seeing extra advanced assaults whereby the risk actor reveals nice information and preparation, taking steps to realize their goal’s belief earlier than deploying payloads.”

In October, the goal was invited to affix a brand new group after which requested for suggestions on an Excel doc that in contrast OKX, Binance and Huobi VIP payment constructions. The doc offered correct data and excessive consciousness of the fact of crypto buying and selling, nevertheless it additionally invisibly sideloaded a malicious .dll (Dynamic Hyperlink Library) file to create a backdoor into the consumer’s system. The goal was then requested to open the .dll file themselves in the course of the course of the dialogue on charges.

The assault method itself has lengthy been identified. Microsoft steered the risk actor was the identical because the one discovered utilizing .dll recordsdata for related functions in June and that was most likely behind different incidents as nicely. In line with Microsoft, DEV-0139 is similar actor that cybersecurity agency Volexity linked to North Korea’s state-sponsored Lazarus Group, utilizing a variant of malware generally known as AppleJeus and an MSI (Microsoft installer). The USA federal Cybersecurity and Infrastructure Safety Company documented AppleJeus in 2021, and Kaspersky Labs reported on it in 2020.

Associated: North Korean Lazarus Group allegedly behind Ronin Bridge hack

The U.S. Treasury Division has formally linked Lazarus Group to North Korea’s nuclear weapons program.