North Korean Lazarus hackers launch large-scale cyberattack by cloning open source software
Date:
Thu, 30 Jan 2025 19:00:00 +0000
Description:
Lazarus hopes devs would pick up the wrong version by mistake.
FULL STORY ======================================================================
- Lazarus was seen poisoning open source software with infostealers
- The campaign is dubbed Phantom Circuit, and targets mostly European
software devs
- Multiple repositories were found poisoned with malware
The notorious North Korean hackers Lazarus have been targeting software developers, particularly those in the Web3 industry, with infostealing
malware , grabbing their credentials, authentication tokens, and other
valuable data, experts have warned.
Cybersecurity researchers SecurityScorecard released a report detailing the campaign, which included a software supply-chain attack and open-source poisoning.
Lazarus Group, an infamous hacking collective on North Koreas payroll, was spotted grabbing different open source tools, poisoning them with malicious code, and then returning them to code repositories and platforms such as Gitlab.
Targeting Web3 devs
Developers would then pick up these tools by mistake, and would unknowingly
get infected with malware.
The researchers named the operation Phantom Circuit, and apparently ended up compromising more than 1,500 victims. Most of them are based in Europe, with notable additions from India and Brazil.
The modified repositories apparently included Codementor, CoinProperty, Web3 E-Store, a Python-based password manager , and other cryptocurrency-related apps, authentication packages, and web3 technologies, citing Ryan Sherstobitoff, senior VP of research and threat intelligence at SecurityScorecard.
The researchers did not say if Lazarus used any known infostealer in this campaign, or created new code from scratch. The group is known for using a
wide variety of tools in their attacks.
Lazarus often targets cryptocurrency companies. Some researchers are saying
the country is engaging in crypto theft to fund its state apparatus, as well
as its weapons program. The group is famous for its fake job campaign, called Operation DreamJob , in which it targets Web3 software developers with fake, lucrative job offers.
During the interview stages, the attackers would trick the candidate into downloading and running infostealers, grabbing their tokens, and those of
their employers. In one such instance, Lazarus managed to steal roughly $600 million.
======================================================================
Link to news story:
https://www.techradar.com/pro/security/north-korean-lazarus-hackers-launch-lar ge-scale-cyberattack-by-cloning-open-source-software
$$
--- SBBSecho 3.20-Linux
* Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)