How Lazarus impersonated Meta to assault a goal in Spain – Week in safety with Tony Anscombe

0
765
How Lazarus impersonated Meta to assault a goal in Spain – Week in safety with Tony Anscombe


Video

During the assault, the group deployed a number of instruments, most notably a newly-discovered subtle backdoor that ESET named LightlessCan

This week, ESET researchers unveiled their findings about an assault by the North Korea-linked APT group Lazarus that took purpose at an aerospace firm in Spain. The group obtained preliminary entry to the corporate’s community after a profitable spearphishing marketing campaign the place they masqueraded as a recruiter for Meta, the corporate behind Facebook, Instagram, and WhatsApp, and contacted the sufferer through LinkedIn Messaging. During the assault, the group deployed a number of instruments, most notably a newly-discovered subtle backdoor that ESET named LightlessCan.

Learn extra in regards to the backdoor and the assault’s mechanics within the video and ensure to provide the complete blogpost a learn right here:

Lazarus luring staff with trojanized coding challenges: The case of a Spanish aerospace firm

Connect with us on FacebookTwitterLinkedIn and Instagram.

LEAVE A REPLY

Please enter your comment!
Please enter your name here