How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe

Video
During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan

Video

During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan

This week, ESET researchers unveiled their findings about an attack by the North Korea-linked APT group Lazarus that took aim at an aerospace company in Spain. The group obtained initial access to the company’s network after a successful spearphishing campaign where they masqueraded as a recruiter for Meta, the company behind Facebook, Instagram, and WhatsApp, and contacted the victim via LinkedIn Messaging. During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan.

Learn more about the backdoor and the attack’s mechanics in the video and make sure to give the full blogpost a read here:

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

Connect with us on FacebookTwitterLinkedIn and Instagram.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.