Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Lazarus enters 6 South Korean firms through Cross Ex, Innorix deficiencies and malicious software for threat
Global Security

Lazarus enters 6 South Korean firms through Cross Ex, Innorix deficiencies and malicious software for threat

AdminBy AdminApril 24, 2025No Comments3 Mins Read
Cross EX, Innorix Zero-Day
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 24, 2025Red LakshmananCriminal software / intelligence threats

Cross EX, Innorix Zero-Day

At least six South Korean organizations were aimed at the North Korea Perennial Related Group Lazarus As part of the company named Sinchol’s operation.

Activities are aimed at South Korea software, IT, financial, semiconductor production and telecommunications industries, according to a Caspersky report published today. The earliest evidence of the compromise was first discovered in November 2024.

The company included “a complex combination of strategy of watering and exploitation of vulnerability within South Korean software”, safety researchers sojun and Vasily Berdnikov – Note. “The lateral motion also used one -day vulnerability in the Innorix agent.”

The attacks were observed that pave the way for the famous Lazarus tools such as Intimidation. Agamomnon. Wagener. Signbtand Chair.

Cybersecurity

What makes these invasion are especially effective, this is likely to operate the Cross Ex Cross Exchangers, which is common in South Korea to ensure the use of Internet banking and government sites to support anti-class and digital signatures based on certificates.

“The Lazarus group shows a strong understanding of this specifics and uses a strategy oriented to South Korea, which combines vulnerabilities in such software with attacks on watering,” said the Russian supplier of cybersecurity.

Operating security deficiency in Innorix agent for lateral motion is characteristic of what similar approach was also adopted by Andariel Substrate In the past, Lazarus group is to deliver malware such as Volgmer and Andardoor.

The starting point of the last wave of attacks is an attack for irrigation that has activated the deployment threats after the goals have visited various South Korean Internet. Visitors landed on the sites are filtered by means of the script on the server side before redirecting them to the domain controlled by the enemy to serve malicious software.

“We assess the average confidence that the redirect site may have fulfilled the harmful scenario, focusing on the potential deficiency in Cross Ex, installed on the target PC, and running malware,” the researchers said. “The scenario then ended in a legitimate synchost.exe and introduced into this process the Valiant ofgerneedle option”.

After the early stages, there is a sequence of infection, adopted two stages, using the threat and variety in the early stages, and then Signbt and Copperedge to establish persistence, conduct and provide tools of dumping accounts for compromised hosts.

Also deployed families of malware, such as LPECLIENT to profiling the victims and delivery of a useful load, as well as the bootloader, called Agamemenon to download and execute additional useful loads obtained from the server command and control (C2), simultaneously incorporating the technique of BP shutter to bypass the safety decisions.

Cybersecurity

One useful load loaded with Agamemenon is a tool designed to carry out lateral motion using a lack of security in the Innorix Agent file transfer. Casper said Since then has been secured Developers.

“It is expected that specialized attacks by Lazarus Group aimed at the supply networks in South Korea will continue in the future,” Kaspersky said.

“The attackers also make efforts to minimize the detection by developing new malware or improving existing malware. In particular, they introduce enhancements in communication with C2, team structure and how they send and receive data.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.