The notorious Lazarus Group, a North Korean Advanced Persistent Threat (APT) group, has been linked to a sophisticated campaign targeting software developers.
This campaign involves the use of infostealer malware, designed to steal sensitive information from developers’ systems.
The attack leverages social engineering tactics, including fake job interviews and compromised NPM packages, to deceive developers into executing malicious scripts.
The malware campaign involves a multi-stage modular approach, using techniques such as Base64 encoding and zlib compression to obfuscate the malicious code.
Threat Intelligence Researcher, Rayssa Cardoso detected a key component of the attack is a Python script that uses a lambda function to decode and execute the malware:-
_ = lambda __ : __import__('zlib').decompress(__import__('base64').b64decode(__[::-1]));exec((_)
This script reverses the input string, decodes it using Base64, decompresses the result with zlib, and then executes the reconstructed Python code using the exec()
function.
Campaign Structure
The malware structure includes several files and folders:-
- script.py: The main file containing instructions to call other script functions.
- sysinfo folder: Contains files for detecting the victim’s operating system and communicating with the Command and Control (C2) server on port 1224.
- n2 folder: Includes files for reading registry keys, storing collected information, installing required libraries, and collecting system and geolocation data.
Lazarus Group uses social engineering tactics like the “ClickFix” method, where users are tricked into executing malicious scripts by clicking on seemingly legitimate buttons.
.webp)
Another tactic involves fake recruiter profiles on platforms like LinkedIn and GitHub, inviting developers to participate in online interviews.
.webp)
During these interviews, candidates are asked to execute malicious code, leading to the installation of malware.
.webp)
The campaign involves several types of malware, including:-
- BeaverTail (JavaScript): Acts as a loader.
- InvisibleFerret (Python): Functions as a backdoor and infostealer.
- Tsunami: A backdoor, RAT, and infostealer used in the Operation99 campaign.
.webp)
The use of sophisticated social engineering tactics and obfuscated malware shows the need for strict vigilance and robust cybersecurity measures.
Indicators of Compromise (IoC)
- 5.253.43[.]122:1224
- 41.208.185[.]235
- 95.164.7[.]171:8637
- http[:]//ip-api[.]com/json
MITRE ATT&CK TTPs
- T1027 – Obfuscated Files or Information
- T1027.002 – Obfuscated Files or Information: Software Packing
- T1204.002 – User Execution: Malicious File
- T1564.001 – Hide Artifacts: Hidden Files and Directories
- T1082 – System Information Discovery
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free