Dec 27, 2022Ravie Lakshmanan
BlueNoroff, a subcluster of the notorious
Lazarus Group, has been observed adopting new techniques into its
playbook that enable it to bypass Windows Mark of the Web
(MotW[1]) protections.
This includes the use of optical disk image (.ISO extension) and
virtual hard disk (.VHD extension) file formats as part of a novel
infection chain, Kaspersky disclosed in a report published
today.
“BlueNoroff created numerous fake domains impersonating venture
capital companies and banks,” security researcher Seongsu Park
said[2], adding the new attack
procedure was flagged in its telemetry in September 2022.
Some of the bogus domains have been found to imitate ABF
Capital, Angel Bridge, ANOBAKA, Bank of America, and Mitsubishi UFJ
Financial Group, most of which are located in Japan, signalling a
“keen interest” in the region.
Also called by the names APT38, Nickel Gladstone, and Stardust
Chollima, BlueNoroff is part of the larger Lazarus threat group[3]
that also comprises[4]
Andariel (aka Nickel Hyatt or Silent Chollima) and Labyrinth
Chollima (aka Nickel Academy).
The threat actor’s financial motivations[5]
as opposed to espionage has made it an unusual nation-state actor
in the threat landscape, allowing for a “wider geographic spread”
and enabling it to infiltrate organizations across North and South
America, Europe, Africa, and Asia.
It has since been associated with high-profile cyber assaults
aimed at the SWIFT banking network between 2015 and 2016, including
the audacious Bangladesh Bank heist[6]
in February 2016 that led to the theft of $81
million[7].
Since at least 2018, BlueNoroff appears to have undergone a
tactical shift, moving away from striking banks to solely focusing
on cryptocurrency entities to generate illicit revenues.
To that end, Kaspersky earlier this year disclosed details of a
campaign dubbed SnatchCrypto[8]
orchestrated by the adversarial collective to drain digital funds
from victims’ cryptocurrency wallets.
Another key activity[9]
attributed to the group is AppleJeus[10], in which fake
cryptocurrency companies are set up to lure unwitting victims into
installing benign-looking applications that eventually receive
backdoored updates.
The latest activity identified by the Russian cybersecurity
company introduces slight modifications to convey its final
payload, swapping Microsoft Word document attachments for ISO files
in spear-phishing emails to trigger the infection.
These optical image files, in turn, contain a Microsoft
PowerPoint slide show (.PPSX) and a Visual Basic Script (VBScript)
that’s executed when the target clicks a link in the PowerPoint
file.
In an alternate method, a malware-laced Windows batch file is
launched by exploiting a living-off-the-land binary (LOLBin) to
retrieve a second-stage downloader that’s used to fetch and execute
a remote payload.
Also uncovered by Kaspersky is a .VHD sample that comes with a
decoy job description PDF file that’s weaponized to spawn an
intermediate downloader that masquerades as antivirus software to
fetch the next-stage payload, but not before disabling[11] genuine EDR solutions
by removing remove user-mode hooks[12].
While the exact backdoor delivered is not clear, it’s assessed
to be similar to a persistence backdoor utilized in the
SnatchCrypto attacks.
The use of Japanese file names for one of the lure documents as
well as the creation of fraudulent domains disguised as legitimate
Japanese venture capital companies suggests that financial firms in
the island country are likely a target of BlueNoroff.
Cyber warfare has been a major focus of North Korea in response
to economic sanctions[13] imposed[14] by a number of
countries and the United Nations over concerns about its nuclear
programs. It has also emerged as a major source of income for the
cash-strapped country.
Indeed, according to South Korea’s National Intelligence Service
(NIS), state-sponsored North Korean hackers are estimated to have
stolen $1.2 billion[15] in cryptocurrency and
other digital assets from targets around the world over the last
five years.
“This group has a strong financial motivation and actually
succeeds in making profits from their cyberattacks,” Park said.
“This also suggests that attacks by this group are unlikely to
decrease in the near future.”
Found this article interesting? Follow us on Twitter [16] and LinkedIn[17] to read more exclusive
content we post.
References
- ^
MotW
(thehackernews.com) - ^
said
(securelist.com) - ^
Lazarus
threat group (thehackernews.com) - ^
comprises
(www.secureworks.com) - ^
financial motivations
(edition.cnn.com) - ^
Bangladesh Bank heist
(thehackernews.com) - ^
theft of
$81 million (www.bbc.com) - ^
SnatchCrypto
(thehackernews.com) - ^
key
activity (securelist.com) - ^
AppleJeus
(thehackernews.com) - ^
disabling
(www.ired.team) - ^
user-mode hooks
(thehackernews.com) - ^
economic sanctions
(en.wikipedia.org) - ^
imposed
(www.cfr.org) - ^
stolen
$1.2 billion (apnews.com) - ^
Twitter
(twitter.com) - ^
LinkedIn
(www.linkedin.com)
Read more https://thehackernews.com/2022/12/bluenoroff-apt-hackers-using-new-ways.html