North Korean group targets nuclear-related organization with new malware
Dec. 19, 2024, 1:39 p.m.
Tags
External References
Description
The Lazarus group has evolved its infection chain by targeting employees of a nuclear-related organization with a combination of new and old malware. The attack involved delivering malicious archive files containing trojanized VNC utilities and various malware strains including Ranid Downloader, MISTPEN, RollMid, LPEClient, CookieTime, and a new modular backdoor called CookiePlus. The infection chain has become more complex, demonstrating improved delivery and persistence methods. CookiePlus, likely the successor to MISTPEN, can download both DLLs and shellcode, making it difficult to detect. The group used compromised WordPress servers as command and control infrastructure for most of the malware.
Date
Published: Dec. 19, 2024, 12:57 p.m.
Created: Dec. 19, 2024, 12:57 p.m.
Modified: Dec. 19, 2024, 1:39 p.m.
Indicators
6f9b79c20330a7c8ade8285866e5602bb86b50a817205ee3c8a466101193386d
Attack Patterns
ServiceChanger
Charamel Loader
CookiePlus
CookieTime
RollMid
Ranid Downloader
MISTPEN
LPEClient
Lazarus
T1573
T1574
T1071
T1543
T1102
T1036
T1204
T1140
T1132
T1027
T1053
T1001
T1566
T1190
T1133
T1059
CVE-2019-0859
CVE-2019-0797
Additional Informations
Energy