How Lazarus Posed as Meta to Attack a Target in Spain – Security Week with Tony Anscombe

esteria.white

Video

During the attack, the group deployed several tools, including a recently discovered sophisticated backdoor dubbed LightlessCan by ESET.

This week, ESET researchers revealed their findings on an attack by the North Korea-linked APT Lazarus group that targeted an aerospace company in Spain. The group gained initial access to the company’s network after a successful spearphishing campaign in which they posed as a recruiter for Meta, the company behind Facebook, Instagram and WhatsApp, and contacted the victim via the LinkedIn messaging. During the attack, the group deployed several tools, including a recently discovered sophisticated backdoor dubbed LightlessCan by ESET.

Learn more about the backdoor and the mechanics of the attack in the video and be sure to read the full blog post here:

Lazarus lures employees with Trojan-based coding challenges: the case of a Spanish aerospace company

Connect with us on Facebook, Twitter, LinkedIn And Instagram.

Leave a comment