Learn more about Lazarus Group, threat group targeting Brazil

Top threat groups targeting Brazil: meet the Lazarus Group

By Ismael Rocha: An advanced persistent threat(APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal private and secret information, damage IT systems and disrupt the functioning of vital systems. Defending against advanced persistent threats is a difficult task as they act stealthily and their intrusions can be difficult to recognize.

Brazil is a country with a wide variety of economic sectors, such as: education/research, financial, health, government/military, retail, energy, communication, technology, among others. These sectors move large amounts of money to governments and organizations, consequently arousing the interest of advanced threat groups. Thus, it is possible to note the great increase in cyber attacks for financial gain, access to secret and confidential files or disruption of the country by cybercriminals.

The hacking group known as the Lazarus Group is an advanced threat that utilizes sophisticated techniques to compromise computer networks and systems. They employ a variety of hacking techniques, including customized malware, phishing attacks, social engineering, and exploitation of security vulnerabilities. Some of the most frequently used techniques are described below:

  • Custom malware, the group is known for developing its own malware to use in its attacks. They have created several malware families, including the Manuscrypt backdoor, the Fallchill trojan and the WannaCry ransomware.
  • Phishing attacks, they also use phishing attacks to trick victims into clicking on malicious links or downloading infected files. Phishing emails may look legitimate and often include a link or attachment that, when clicked or downloaded, installs malware on the victim's computer.
  • Social engineering, Lazarus is known to use social engineering techniques to gain access to victims' systems. This can include using false pretenses to obtain sensitive information such as passwords and usernames.
  • Exploitation of security vulnerabilities, is well known for exploiting known security vulnerabilities in systems and software to gain unauthorized access to computer networks and systems.

The Lazarus group's targets include governments, companies and organizations around the world, from diverse sectors including finance, energy, cryptocurrencies and media. The group's motivations may vary, but in general, they seek to obtain confidential and financial information for their own benefit or for political purposes.

Lazarus Group operating mode

Figure 1 - Threat mode of operation

The Lazarus Group advanced threat attack chain typically involves several steps, including:

  • Reconnaissance - The group collects information about the target through social engineering techniques, such as phishing, and collecting publicly available information on the internet.
  • Delivery - After identifying their targets, the group uses various techniques to deliver their malicious payload, such as phishing, social engineering and exploiting vulnerabilities in outdated systems.
  • Exploitation - Once the malicious payload is successfully delivered, the group uses exploitation techniques to gain access to the target's system. This may involve exploiting known software vulnerabilities, using previously installed backdoors, or other methods.
  • Propagation - Within the system, the group spreads to other devices and systems within the target's network in order to ensure persistent access and maximize the impact of the attack.
  • Information theft - The Lazarus Group's primary goal is to steal sensitive information such as intellectual property, trade secrets, personal data and financial information. The group uses advanced espionage techniques to steal this information and transfer it to their command and control servers.
  • Malicious actions - The group can perform other malicious actions such as installing backdoors, creating user accounts with elevated privileges and exfiltrating data in order to maintain access and continue to steal information.

In summary, the Lazarus Group is a highly sophisticated group that utilizes a wide range of techniques to carry out its cyberattacks. The attack chain can vary depending on the specific target and the type of information the group is trying to steal, but in general, these steps are common to many of the group's attacks.

The group's main targets

It is important to note that the Lazarus group is known to target organizations around the world, and that this list of countries is not exhaustive. The group's motivations may vary, but in general, they seek to obtain confidential and financial information for their own benefit or for political purposes. Companies and organizations should take steps to protect their networks and systems from cyberattacks, regardless of their geographic location.

Figure 2 - Target countries of the threat

Techniques used in attacks

Lazarus Group is known to use a variety of malware tools and hacking techniques in its attacks, including:

  • Backdoors - To maintain persistent access to compromised systems.
  • RATs (Remote Access Trojans) - To remotely control compromised systems.
  • Keyloggers - To steal login information and other sensitive information.
  • Banking malware - To steal financial information and perform fraudulent transfers.
  • Spear-phishing - To deliver your malware to targets.
  • Custom malware - Lazarus Group is known for creating its own custom malware, including the Destover malware used in the 2014 Sony Pictures attack.
  • Zero-days - The group is also known for using zero-day vulnerabilities in its attacks, which are unknown software vulnerabilities that have not yet been patched by manufacturers.

The group is highly sophisticated and constantly evolving, so it is likely that the group is using new tools and techniques that have not yet been identified by security researchers.

TTPs - MITRE ATT&CK

TacticsTechniqueDetails
Defense Evasion Privilege EscalationT1134The Lazarus Group keylogger, KiloAlfa, obtains user tokens from interactive sessions to execute itself with API call CreateProcessAsUserAs under the context of that user.
DiscoveryT1087Query the compromised victim's active directory servers to obtain the list of employees, including administrator accounts.
PersistenceT1098The Lazarus Group malware, WhiskeyDelta-Two, contains a function that attempts to rename the administrator's account.
Resource DevelopmentT1583Acquired domains related to their campaigns to act as distribution points and C2 channels.
Credential Access CollectionT1557Ran Responder using the command[Responder file path] -i[IP address] -rPve a compromised host to collect credentials and move laterally.
Command and ControlT1071Conducting C2 over HTTP and HTTPS.
CollectionT1560Compressed exfiltrated data with RAR and used the RomeoDelta malware to archive specific directories in .zip format, encrypt the .zip file and send it to C2.
Persistence Privilege EscalationT1547Maintained persistence by loading malicious code into a startup folder or adding a key.
Credential AccessT1110The Lazarus Group malware attempts to connect to Windows shares for lateral movement using a generated list of usernames, which focus on permutations of the Administrator username and weak passwords.
ExecutionT1059Using PowerShell to execute malicious commands and code.
Persistence Privilege EscalationT1543Several malware families from the Lazarus Group install themselves as new services.
ImpactT1485Use of customized secure delete function to overwrite file contents with data from heap memory.
CollectionT1005Collection of data and files from compromised networks.
Command and ControlT1001It uses a unique form of communication encryption known as FakeTLS, which mimics TLS but uses a different encryption method, potentially avoiding inspection/decryption of SSL traffic.
Defense EvasionT1140Use of shellcode within macros to manually decrypt and map DLLs and shellcode into memory at runtime.

Indicators of Commitment (IoCs)

ISH Technology handles several Indicators of Commitment collected through open sources, closed sources and also through analysis performed by the Heimdall security team. In light of this, below we list all Indicators of Commitments (IOCs) related to the analysis of the artifact(s) in this report.

Malicious/analyzed artifact compromise indicators
md5:aac5a52b939f3fe792726a13ff7a1747
sha1:f6760fb1f8b019af2304ea6410001b63a1809f1d
sha256:cc307cfb401d1ae616445e78b610ab72e1c7fb49b298ea003dd26ea80372089a
File name:sysnetd
Indicators of compromise ofmalicious/analyzedartifact
md5:2ff1688fe866ec2871169197f9d46936
sha1:6dc37ff32ea70cbd0078f1881a351a0a4748d10e
sha256:b05aae59b3c1d024b19c88448811debef1eada2f51761a5c41e70da3db7615a9
File name:524100.exe
Malicious/analyzed artifact compromise indicators
md5:38fc56965dccd18f39f8a945f6ebc439
sha1:50736517491396015afdf1239017b9abd16a3ce9
sha256:32ec329301aa4547b4ef4800159940feb950785f1ab68d85a14d363e0ff2bc11
File name:sdchange.exe
Malicious/analyzed artifact compromise indicators
md5:5c0c1b4c3b1cfd455ac05ace994aed4b
sha1:69cda1f1adeeed455b519f9cf188e7787b5efa07
sha256:8a1d57ee05d29a730864299376b830a7e127f089e500e148d96d0868b7c5b520
File name:provthrd.dll
Malicious/analyzed artifact compromise indicators
md5:d2da675a8adfef9d0c146154084fff62
sha1:c55d080ea24e542397bbbfa00edc6402ec1c902c
sha256:f8f7720785f7e75bd6407ac2acd63f90ab6c2907d3619162dc41a8ffa40a5d03
File name:d2da675a8adfef9d0c146154084fff62.virus
Malicious/analyzed artifact compromise indicators
md5:f315be41d9765d69ad60f0b4d29e4300
sha1:f60c2bd78436a14e35a7e85feccb319d3cc040eb
sha256:fe43bc385b30796f5e2d94dfa720903c70e66bc91dfdcfb2f3986a1fea3fe8c5
File name:xwtpdui.dll
Malicious/analyzed artifact compromise indicators
md5:37505b6ff02a679e70885ccd60c13f3b
sha1:6402fafa0864460fea18a83ec4885bfe179734b2
sha256:2fc71184be22ed1b504b75d7bde6e46caac0bf63a913e7a74c3b65157f9bf1df
File name:Binance_Guide (1).doc

Distribution URLs and C2 IP addresses:

109[.]248[.]150[.]13
192[.]186[.]183[.]133
54[.]68[.]42[.]4
84[.]38[.]133[.]145
104[.]155[.]149[.]103
40[.]121[.]90[.]194
185[.]29[.]8[.]162
46[.]183[.]221[.]109
84[.]38[.]133[.]145

Note: The links and IP addresses listed above may be active. Be careful when manipulating these IoCs, avoid clicking and becoming a victim of malicious content hosted on the IoC.

How to protect yourself from Lazarus Group

In addition to the indicators of commitment listed above, measures may be taken to mitigate against the threat, such as:

  • Keep software up to date, make sure all your operating systems, applications and programs have the latest versions and regularly apply security updates made available by vendors. This helps to patch known vulnerabilities and reduce the attack surface.
  • Use a reliable antivirus solution, install and keep updated robust antivirus software on all your devices. This will help detect and remove malware, including those used by Lazarus Group.
  • Strengthen passwords, use strong and unique passwords for all your accounts and avoid reusing them. Consider using password managers to help remember and protect your credentials.
  • Be aware of phishing, Lazarus Group often uses phishing emails to distribute malware. Therefore, be careful when opening attachments or clicking on links in suspicious emails. Always verify the authenticity of senders before providing sensitive information.
  • Use two-factor authentication (2FA), enable two-factor authentication whenever possible, as this adds an extra layer of security by requiring a second form of authentication in addition to the password, such as a code sent to your mobile device.
  • Back up regularly, perform periodic backups of your important data and make sure it is stored in secure locations and out of reach of cyber attacks. This will help minimize the damage caused by ransomware attacks or data loss.
  • Educate users, train yourself and your staff on cybersecurity best practices, such as recognizing signs of a phishing attack, avoiding downloading suspicious files, and maintaining caution when browsing the internet.
  • Monitor suspicious activity, be aware of any unusual activity on your systems, such as abnormal behavior or suspicious network traffic. Use monitoring and intrusion detection tools to identify potential compromises.
  • Establish a security policy, implement clear and strict security policies in your organization. This includes restrictions on access to sensitive information, use of personal devices and guidelines for handling security incidents.

References

Leave a Comment

Your e-mail address will not be published. Required fields are marked with *