ALBAWABA - In a recent cyber incident, the Lazarus Group, suspected to have ties to North Korea, successfully infiltrated a Spanish aerospace company's network through a well-executed spear-phishing attack.
The attack occurred last year and involved the group impersonating a recruitment specialist supposedly working for Meta, the parent company of major platforms like Facebook, Instagram, and WhatsApp.
The primary objective of this breach was documented as cyber espionage.
The fake recruitment specialist initiated contact with the victim through LinkedIn Messaging, a feature provided by the professional networking platform LinkedIn. The victim was then sent two coding tests, presented as a standard part of the hiring process.
Collaborating closely with the affected aerospace company, ESET Research managed to reconstruct the initial steps leading to the breach and conducted an analysis of the toolset utilized by Lazarus. It was discovered that the group had targeted multiple employees within the organization.
In the ever-evolving landscape of cybercrime, a notorious cybercriminal has made headlines by orchestrating cross-chain criminal activities amounting to a staggering $900 million. The Lazarus Group, a name consistently associated with high-profile hacking incidents, has once again come into the spotlight. In a recent breach, hackers managed to abscond with digital assets valued at an eye-watering $200 million. The world of cybersecurity continues to grapple with these audacious threats and sophisticated criminal operations.
Lazarus, also recognized as HIDDEN COBRA, is believed to have been operational since 2009 and is linked to North Korea. The group is notorious for its involvement in cyber espionage, sabotage, and financial cybercrime activities, encompassing the three fundamental elements of cybercriminal operations. Aerospace firms often find themselves in the crosshairs of APT (Advanced Persistent Threat) groups affiliated with North Korea.