Article Details
Scrape Timestamp (UTC): 2023-12-11 21:27:03.666
Original Article Text
Click to Toggle View
Lazarus hackers drop new RAT malware using 2-year-old Log4j bug. The notorious North Korean hacking group known as Lazarus continues to exploit CVE-2021-44228, aka "Log4Shell," this time to deploy three previously unseen malware families written in DLang. The new malware are two remote access trojans (RATs) named NineRAT and DLRAT and a malware downloader named BottomLoader. The D programming language is rarely seen in cybercrime operations, so Lazarus probably chose it for new malware development to evade detection. The campaign, which Cisco Talos researchers codenamed "Operation Blacksmith," started around March 2023 and targets manufacturing, agricultural, and physical security companies worldwide. Operation Blacksmith represents a notable shift in tactics and tools used by Lazarus, serving as yet another demonstration of the threat group's ever-shifting tactics. New malware tools The first malware, NineRAT, is Lazarus' first of the two novel RATs. It uses the Telegram API for command and control (C2) communication, including receiving commands and exfiltrating files from the breached computer. NineRAT incorporates a dropper, which is also responsible for establishing persistence and launching the main binaries. The malware supports the following commands, which are accepted via Telegram: The second malware, DLRAT, is a trojan and downloader that Lazarus can use to introduce additional payloads on an infected system. DLRAT's first activity on a device is to execute hard-coded commands to collect preliminary system information like OS details, network MAC address, etc., and send it to the C2 server. The attacker's server replies with the victim's external IP address and one of the following commands for local execution by the malware: Finally, Cisco's analysts discovered BottomLoader, a malware downloader that fetches and executes payloads from a hardcoded URL using PowerShell while also establishing persistence from them by modifying the Startup directory. In addition, BottomLoader offers Lazarus the capacity to exfiltrate files from the infected system to the C2 server, providing some operational versatility. Log4Shell attacks The attacks observed by Cisco Talos involve leveraging Log4Shell, a critical remote code execution flaw in Log4j, which was discovered and fixed approximately two years ago yet remains a security problem. The targets are publicly facing VMWare Horizon servers, which use a vulnerable version of the Log4j logging library, allowing the attackers to perform remote code execution. Following the compromise, Lazarus sets up a proxy tool for persistent access on the breached server, runs reconnaissance commands, creates new admin accounts, and deploys credential-stealing tools like ProcDump and MimiKatz. In the second phase of the attack, Lazarus deploys the NineRAT on the system, which supports a wide range of commands, as highlighted in the previous section. Cisco concludes that it's possible Lazarus feeds other APT (advanced persistent threat) groups or clusters under its umbrella with data collected by NineRAT. This assumption is based on the fact that NineRAT performs system "re-fingerprinting" in some cases, implying that it could be performing system IDing and data collection for multiple actors.
Daily Brief Summary
North Korean hacking group Lazarus exploits the Log4Shell vulnerability to deploy new malware, including two remote access trojans (RATs) and a downloader, targeting multiple industries internationally.
Cisco Talos labels the campaign "Operation Blacksmith," observing its commencement around March 2023 with attacks on manufacturing, agricultural, and physical security companies.
The D programming language is utilized in creating the new malware to likely avoid detection, marking a strategic shift in Lazarus Group's cyber offensive tactics.
NineRAT, one of the RATs, uses Telegram API for command and control operations, while DLRAT collects system information and accepts remote commands for payload delivery.
BottomLoader, the malware downloader, establishes persistence and retrieves payloads using PowerShell, modifying the startup directory to maintain long-term access.
The attack process begins with exploiting vulnerable VMWare Horizon servers via Log4Shell, after which Lazarus conducts reconnaissance and maintains presence via proxy tools and credential theft utilities like ProcDump and MimiKatz.
The findings by Cisco Talos suggest Lazarus might share data with other APT groups, indicating a broad and collaborative approach to cyber espionage and threat activities.