Lazarus Tricking Employees with Trojanized Coding Challenges

Lazarus group has been recently discovered to have targeted an Aerospace company in Spain, which involved deploying several tools, including an undocumented backdoor named “LightlessCan.” Reports indicate that the threat actor gained access to the organization’s network last year using a spearphishing campaign impersonating a recruiter from Meta. The threat group contacted one of the victims inside the organization via LinkedIn social networking, posing as a recruiter from Meta.

Source: GBHackers

 


Date:

Categorie(s):