Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Lazarus enters 6 South Korean firms through Cross Ex, Innorix deficiencies and malicious software for threat
Global Security

Lazarus enters 6 South Korean firms through Cross Ex, Innorix deficiencies and malicious software for threat

AdminBy AdminApril 24, 2025No Comments3 Mins Read
Cross EX, Innorix Zero-Day
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 24, 2025Red LakshmananCriminal software / intelligence threats

Cross EX, Innorix Zero-Day

At least six South Korean organizations were aimed at the North Korea Perennial Related Group Lazarus As part of the company named Sinchol’s operation.

Activities are aimed at South Korea software, IT, financial, semiconductor production and telecommunications industries, according to a Caspersky report published today. The earliest evidence of the compromise was first discovered in November 2024.

The company included “a complex combination of strategy of watering and exploitation of vulnerability within South Korean software”, safety researchers sojun and Vasily Berdnikov – Note. “The lateral motion also used one -day vulnerability in the Innorix agent.”

The attacks were observed that pave the way for the famous Lazarus tools such as Intimidation. Agamomnon. Wagener. Signbtand Chair.

Cybersecurity

What makes these invasion are especially effective, this is likely to operate the Cross Ex Cross Exchangers, which is common in South Korea to ensure the use of Internet banking and government sites to support anti-class and digital signatures based on certificates.

“The Lazarus group shows a strong understanding of this specifics and uses a strategy oriented to South Korea, which combines vulnerabilities in such software with attacks on watering,” said the Russian supplier of cybersecurity.

Operating security deficiency in Innorix agent for lateral motion is characteristic of what similar approach was also adopted by Andariel Substrate In the past, Lazarus group is to deliver malware such as Volgmer and Andardoor.

The starting point of the last wave of attacks is an attack for irrigation that has activated the deployment threats after the goals have visited various South Korean Internet. Visitors landed on the sites are filtered by means of the script on the server side before redirecting them to the domain controlled by the enemy to serve malicious software.

“We assess the average confidence that the redirect site may have fulfilled the harmful scenario, focusing on the potential deficiency in Cross Ex, installed on the target PC, and running malware,” the researchers said. “The scenario then ended in a legitimate synchost.exe and introduced into this process the Valiant ofgerneedle option”.

After the early stages, there is a sequence of infection, adopted two stages, using the threat and variety in the early stages, and then Signbt and Copperedge to establish persistence, conduct and provide tools of dumping accounts for compromised hosts.

Also deployed families of malware, such as LPECLIENT to profiling the victims and delivery of a useful load, as well as the bootloader, called Agamemenon to download and execute additional useful loads obtained from the server command and control (C2), simultaneously incorporating the technique of BP shutter to bypass the safety decisions.

Cybersecurity

One useful load loaded with Agamemenon is a tool designed to carry out lateral motion using a lack of security in the Innorix Agent file transfer. Casper said Since then has been secured Developers.

“It is expected that specialized attacks by Lazarus Group aimed at the supply networks in South Korea will continue in the future,” Kaspersky said.

“The attackers also make efforts to minimize the detection by developing new malware or improving existing malware. In particular, they introduce enhancements in communication with C2, team structure and how they send and receive data.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.