

STOP aka DJVU Ransomware – Active IOCs
April 25, 2024
Cybercriminals Distribute GuptiMiner Malware by Hijacking Antivirus Update Systems – Active IOCs
April 25, 2024
STOP aka DJVU Ransomware – Active IOCs
April 25, 2024
Cybercriminals Distribute GuptiMiner Malware by Hijacking Antivirus Update Systems – Active IOCs
April 25, 2024Severity
High
Analysis Summary
Lazarus APT is one of North Korea's most sophisticated threat actors, operating since at least 2009. Initially, they concentrated on South Korea. It has recently shifted its focus to worldwide targets and began initiating attacks for monetary gain. This actor has been linked to attacks in South Korea, the United States, Japan, and several other nations. Lazarus APT is suspected of being behind several diverse efforts, including cyber espionage, and attacks on financial institutions, government agencies, and the military.
The Lazarus group has been known to use a variety of tactics, techniques, and procedures TTPs in their operations, including spear-phishing, malware, and social engineering. One of their recent campaigns, known as "Dream Job," specifically targets cryptocurrency-adjacent entities by impersonating legitimate job recruiters and tricking individuals into downloading malware.
The Lazarus Group is a highly sophisticated and well-funded organization and is considered to be one of the most significant threats to organizations and individuals in the cybersecurity landscape. This APT group has been associated with other threat actor groups, including Bluenoroff and Andariel, believed to be subgroups or closely aligned with Lazarus. The group has been also linked to other cybercriminal activities, such as cryptocurrency thefts and ransomware campaigns, suggesting potential collaboration with non-state actors for financial gain.
To protect against Lazarus APT and similar threats, it is important to regularly update software and security patches, implement multi-factor authentication, be cautious when opening emails and attachments, and regularly back up important data.
Impact
- Information Theft and Espionage
- Exposure to Sensitive Data
Indicators of Compromise
MD5
- 7a5a694ac7d4068f580be624ece44f4f
- aad9dcd3a2045dafea47eef776ec5b8a
- 53ec27df858d3d133808ec338df29fc6
- e6d09c7ad340d10109e6781bfb05a319
- f1b78698b108fbf5bfcbb6d7f3bbad76
- fa174cdd22080f11e13844c1e3326cd2
- 97868b884fc9d01c0cb1f3fa4d80b09f
- d3a85f6ccf117fb1cdb506094edddd22
- 46b2cfef633e6e531928a9c606b40b16
- 88f61e48a4a815a68332e1fb28ee5fa5
SHA-256
- c09271054916807f78795a7440c6223d05c6dd543b97fd3a32aa44b1e8dc658e
- 1e959131e5964fc47b468bd5b920221a418b660898a692215ee996452d0b741a
- a33d1e04c9645b17dd8bbea5aff8dc3c159319fb230de7877af7bed16b5b4e19
- 378fd878c019b7894749f56f27f8c9ecb07724f51b7d2a8e158c3132a7f25df9
- 2fe778753b3f885a8a87cbe4c15c92d06d8760a9d4196ade416d86f5780b9c60
- c54a87c05ba3ba902a3f94a5c54bc369c3f46bea8b95e3cd8bf525149d808b4a
- 39785213364b84c1442d133c778bf5472d76d8ef13b58b32b8dd8ac0201c82ca
- 5cc1493357886c767354f152b940d63991f07a5010f22a46e8a514a08fbe3b18
- f790ad0bfe7a465805b44264c88588e70eb3200806ac290150205a57d28d6b1a
- a19a9f6944e7fd733acf5287b87040bde41727a658e66562bd87bb347af438f3
SHA1
- 3e52250148123c5105ce251899cf6ba696657daf
- b69740225bf9c370ade85120fabff3e0a06ec747
- 61ffca2e47ca270e13be7b42b2457870f5399470
- ade8144a50dd11373ec7df8410424c41ec944b7f
- ae6dc48dab57cbb98e94f31ff762083c778e1e42
- 8d46f2d2d3c9ede05ff9decf7a347045e7632ac7
- d1ad5b904ecd909a5e6b0a091e78023cc2dc8a53
- 9be879834f1b2e19adfc342657a70be2da5fb27e
- 9cacbe18dca9df61f8adffd856193519d45425b2
- 047f6e4b551b51344f4aa7192b89501177fa9a27
Remediation
- Always be suspicious about emails sent by unknown senders.
- Never click on links/attachments sent by unknown senders.
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Enable two-factor authentication.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.