Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Lazarus Group Evolved Their Infection Chain with Old and New Malware

Автор: FIRST

Загружено: 2025-08-12

Просмотров: 118

Описание:

Sojun Ryu (Kaspersky, KR)

Sojun Ryu graduated from the 'Next Generation of Top Security Leader Program' (Best of Best, BoB) at the Korea Information Technology Institute (KITRI) in 2013, and holds a Master's degree in information security from Sungkyunkwan University in Korea. Sojun worked at KrCERT/CC for seven years, analyzing malware and responding to incidents, and is one of the authors of "Operation Bookcodes" published by KrCERT/CC in 2020. After moving to S2W, a cybersecurity startup in Korea, he expanded his coverage during his time as a team leader, focusing on not only APT but also on cybercrime. Sojun is now a member of GReAT at Kaspersky and is very focused on APT research.
--
Over recent years, the Lazarus APT group has distributed their own malware by leveraging fraudulent job opportunities targeting employees in various industries, including defense, aerospace, cryptocurrency, and other global sectors. This attack campaign is called DeathNote campaign and is also referred to as "Operation DreamJob".During our recent investigation, we observed that the Lazarus group had delivered archive files containing malicious files to at least two employees who were engaged with the same organization over the course of one month. The threat actor used a fake job offer sent by an impersonated recruiter.After looking into the attack, we were able to uncover a detailed infection chain, giving us insight into their intentions. Although they used known strategies and malware for initial infiltration, they intentionally introduced new malware to avoid detection by leveraging on the fact that the malware hasn't been used before. They have also stepped up their efforts to actively evade detection by exploiting legitimately compromised websites as C2 servers.

Lazarus Group Evolved Their Infection Chain with Old and New Malware

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Revolutionizing Malware Analysis with Agentic AI: Lessons and Innovations

Revolutionizing Malware Analysis with Agentic AI: Lessons and Innovations

Threat Hunting with Python & Pandas

Threat Hunting with Python & Pandas

Are You Talking to Humans? The Terrifying Reality of AI Bots

Are You Talking to Humans? The Terrifying Reality of AI Bots

Automated ATT&CK Technique Chaining

Automated ATT&CK Technique Chaining

Friday Keynote Address - Network Security is a Team Sport, so How Do We Set and Manage the Team

Friday Keynote Address - Network Security is a Team Sport, so How Do We Set and Manage the Team

Plenary Talk: Aligning Task Utility and Human Preferences through LLM-Guided Reward Shaping

Plenary Talk: Aligning Task Utility and Human Preferences through LLM-Guided Reward Shaping

Dark Web РАСКРЫТ (БЕСПЛАТНО + Инструмент с открытым исходным кодом)

Dark Web РАСКРЫТ (БЕСПЛАТНО + Инструмент с открытым исходным кодом)

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Это спасет, когда заблокируют ВЕСЬ ИНТЕРНЕТ!

Это спасет, когда заблокируют ВЕСЬ ИНТЕРНЕТ!

СЫРЫЕ видео от НАСТОЯЩИХ хакеров

СЫРЫЕ видео от НАСТОЯЩИХ хакеров

One SOC, The Whole SOC, and Nothing But The SOC, So Help Me

One SOC, The Whole SOC, and Nothing But The SOC, So Help Me

What Can Cybersecurity Incident Responders Learn from Real-World Crises?

What Can Cybersecurity Incident Responders Learn from Real-World Crises?

DEFCON — это не то, чего я ожидал...

DEFCON — это не то, чего я ожидал...

Сложность пароля — это ложь. Вот что на самом деле защищает вас

Сложность пароля — это ложь. Вот что на самом деле защищает вас

Meshtastic в России: законно ли использовать?

Meshtastic в России: законно ли использовать?

The Funny Story of Active Directory Backdooring

The Funny Story of Active Directory Backdooring

What's New in CSAF v2.1: Key Updates Explained

What's New in CSAF v2.1: Key Updates Explained

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Это вредоносное ПО? — Получение root-прав на SuperBox S6 Pro

Это вредоносное ПО? — Получение root-прав на SuperBox S6 Pro

Я в опасности

Я в опасности

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com