Friday, April 25, 2025

Lazarus Hits 6 South Korean Companies through Cross EX, Innorix Flaws and ThreatNeedle Malware

Apr 24, 2025Ravie LakshmananMalware / Menace Intelligence

Lazarus Hits 6 South Korean Companies through Cross EX, Innorix Flaws and ThreatNeedle Malware

At the least six organizations in South Korea have been focused by the prolific North Korea-linked Lazarus Group as a part of a marketing campaign dubbed Operation SyncHole.

The exercise focused South Korea’s software program, IT, monetary, semiconductor manufacturing, and telecommunications industries, based on a report from Kaspersky revealed at present. The earliest proof of compromise was first detected in November 2024.

The marketing campaign concerned a “refined mixture of a watering gap technique and vulnerability exploitation inside South Korean software program,” safety researchers Sojun Ryu and Vasily Berdnikov stated. “A one-day vulnerability in Innorix Agent was additionally used for lateral motion.”

The assaults have been noticed paving the way in which for variants of identified Lazarus instruments corresponding to ThreatNeedle, AGAMEMNON, wAgent, SIGNBT, and COPPERHEDGE.

Cybersecurity

What makes these intrusions significantly efficient is the seemingly exploitation of a safety vulnerability in Cross EX, a legit software program prevalent in South Korea to allow the usage of safety software program in on-line banking and authorities web sites to help anti-keylogging and certificate-based digital signatures.

“The Lazarus group reveals a robust grasp of those specifics and is utilizing a South Korea-targeted technique that mixes vulnerabilities in such software program with watering gap assaults,” the Russian cybersecurity vendor stated.

The exploitation of a safety flaw in Innorix Agent for lateral motion is notable for the truth that an identical strategy has additionally been adopted by the Andariel sub-cluster of the Lazarus Group prior to now to ship malware corresponding to Volgmer and Andardoor.

The place to begin of the newest wave of assaults is a watering gap assault, which activated the deployment of ThreatNeedle after targets visited numerous South Korean on-line media websites. Guests who land on the websites are filtered utilizing a server-side script previous to redirecting them to an adversary-controlled area to serve the malware.

“We assess with medium confidence that the redirected web site could have executed a malicious script, concentrating on a possible flaw in Cross EX put in on the goal PC, and launching malware,” the researchers stated. “The script then finally executed the legit SyncHost.exe and injected a shellcode that loaded a variant of ThreatNeedle into that course of.”

The an infection sequence has been noticed adopting two phases, utilizing ThreatNeedle and wAgent within the early phases after which SIGNBT and COPPERHEDGE for establishing persistence, conducting reconnaissance, and delivering credential dumping instruments on the compromised hosts.

Additionally deployed are malware households corresponding to LPEClient for sufferer profiling and payload supply, and a downloader dubbed Agamemnon for downloading and executing further payloads acquired from the command-and-control (C2) server, whereas concurrently incorporating the Hell’s Gate method to bypass safety options throughout execution.

Cybersecurity

One payload downloaded by Agamemnon is a device designed to hold out lateral motion by exploiting a safety flaw within the Innorix Agent file switch device. Kaspersky stated its investigation unearthed an extra arbitrary file obtain zero-day vulnerability in Innorix Agent that has since been patched by the builders.

“The Lazarus group’s specialised assaults concentrating on provide chains in South Korea are anticipated to proceed sooner or later,” Kaspersky stated.

“The attackers are additionally making efforts to attenuate detection by growing new malware or enhancing current malware. Specifically, they introduce enhancements to the communication with the C2, command construction, and the way in which they ship and obtain information.”

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.


Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles