By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Lazarus hackers breach six companies in watering hole attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Lazarus hackers breach six companies in watering hole attacks
Tech News

Lazarus hackers breach six companies in watering hole attacks

By admin 5 Min Read
Share
SHARE

In a recent espionage campaign, the infamous North Korean threat group Lazarus targeted multiple organizations in the software, IT, finance, and telecommunications sectors in South Korea.

The threat actor combined a watering hole attack strategy with an exploit for a vulnerability in a file transfer client that is required in South Korea to complete certain financial and administrative tasks.

Researchers at Kasperky named the campaign ‘Operation SyncHole’ and say that the activity compromised at least half a dozen organizations between November 2024 and February 2025.

“We identified at least six software, IT, financial, semiconductor manufacturing and telecommunication organizations in South Korea that fell victim to “Operation SyncHole,” Kasperky notes in a report.

Operation SyncHole activity timeline
<strong>Operation SyncHole activity timeline</strong><br /><em>Source: Kaspersky</em>

“However, we are confident that there are many more affected organizations across a broader range of industries, given the popularity of the software exploited by Lazarus in this campaign,” the researchers added.

According to Kaspersky, Lazarus hackers used an exploit that was known by the vendor at the time of the investigation, but it had been leveraged before in other attacks.

Target selection

The attack started with targets visiting legitimate South Korean media portals that Lazarus had compromised with server-side scripts for profiling visitors and redirecting valid targets to malicious domains.

In the incidents analyzed by Kaspersky, victims are redirected to sites that mimick software vendors, such as the distributor of Cross EX – a tool that enables South Koreans to use security software in various web browsers for online banking and interactions with government websites.

“Although the exact method by which Cross EX was exploited to deliver malware remains unclear, we believe that the attackers escalated their privileges during the exploitation process as we confirmed the process was executed with high integrity level in most cases,” explained Kaspersky.

Site that triggers the exploit
<strong>Site that triggers the initial infection</strong><br /><em>Source: Kaspersky</em>

The researchers say that a malicious JavaScript on the fake website exploits the Cross EX software to deliver malware.

Although Kaspersky did not find the exact exploitation method used, the researchers “believe that the attackers escalated their privileges during the exploitation process.”

Furthermore, “according to a recent security advisory posted on the KrCERT website, there appear to be recently patched vulnerabilities in Cross EX, which were addressed during the timeframe of our research,” Kaspersky’s report notes.

The exploit launches the legitimate ‘SyncHost.exe’ process and injects shellcode in it to load the ‘ThreatNeedle’ backdoor, which can execute 37 commands on the infected host. 

The attack flow
<strong>The attack flow</strong><br /><em>Source: Kaspersky</em>

Kaspersky observed multiple infection chains across the six confirmed victims, which differ in earlier and later phases of the attack, only the initial infection being the common ground.

In the first phase, ThreatNeedle was used to deploy ‘LPEClient’ for system profiling, the ‘wAgent’ or ‘Agamemnon’ malware downloaders, and the ‘Innorix Abuser’ tool for lateral movement.

Kaspersky notes that Innorix Abuser exploited a vulnerability in the Innorix Agent file transfer solution version 9.2.18.496 and addressed in the latest version of the software.

In some cases, ThreatNeedle wasn’t used at all, with Lazarus instead using the ‘SIGNBT’ implant to deploy the ‘Copperhedge’ backdoor used for internal reconnaissance.

Various attack chains observed
<strong>Various attack chains observed</strong><br /><em>Source: Kaspersky</em>

Based on the tooling used in Operation SyncHole attacks, Kaspersky was able to confidently attribute the compromises to the Lazarus hacker group backed by the North Korean government.

Additional clues pointing to the threat actor were the working hours/apparent timezone along with techniques, tactics, and procedures (TTPs) specific to Lazarus.

Based on the recent malware samples used in Operation SyncHole, Kaspersky observed that Lazarus is moving towards lightweight and modular tools that are both stealthier and more configurable.

The cybersecurity firm says it has communicated its findings to the Korea Internet & Security Agency (KrCERT/CC) and confirmed that patches have been released for the software exploited in this campaign.

During the attack analysis, Kaspersky researchers also found a non-exploited zero-day flaw (KVE-2024-0014) in Innorix Agent versions 9.2.18.001 through 9.2.18.538, which allowed arbitrary file downloads.

The researchers reported the security issue responsibly through the Korea Internet & Security Agency (KrCERT) and the vendor addressed it in an update last month.

You Might Also Like

This Lightweight Laptop Is Almost Half Off

New SonicWall SonicOS flaw allows hackers to crash firewalls

lynx, beavers, and aurochs benefit landscapes

Dell Pro Max 18 Plus: Desktop Power in a Portable Laptop

CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

TAGGED: Actively Exploited, Lazarus Group, North Korea, South Korea, Vulnerability, Watering Hole, Zero-Day
Share This Article
Facebook Twitter Copy Link
Previous Article Will any team trade up on Thursday night for generational prospect Travis Hunter?
Next Article In a Boon for Tesla, Feds Weaken Rules for Reporting on Self-Driving
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

What’s causing the crypto sell-off, who is losing, and will it last?
Business
This Lightweight Laptop Is Almost Half Off
Tech News
New SonicWall SonicOS flaw allows hackers to crash firewalls
Tech News
Sixteen European national football teams to battle for four World Cup spots in March playoffs
World News
Amazon Clears Out eero 7 WiFi 7 Router (3-Pack) at an Almost Free Per Unit Price in a Bold Black Friday Move
Gaming News
How on earth has this FTSE 250 stock fallen 49% in a year?
Business
VerifiedX taps Crypto.com to provide institutional-grade custody and liquidity support
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

What’s causing the crypto sell-off, who is losing, and will it last?

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
What’s causing the crypto sell-off, who is losing, and will it last?
November 20, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?