Malwarebytes cybersecurity experts found 2 decoy documents in the North Korea APT’s campaign Lockheed Martin campaign, that use macro to spread malicious code.
Malwarebytes cybersecurity experts: It is been potentially linked to the North Korean’s APT37. The malware is distributed via spear phishing with 2 weaponized documents.
Malwarebytes cybersecurity experts: It exploits a fake Java update, social engineering, and a decoy page filled with adult images purporting to be movies.
The cyber security experts: It’s present in online forums-torrent sites linked to MacOS software. The malware incorporates a keylogger, a reverse shell and can empty cryptocurrency wallets.
Malwarebytes cyber security experts: The malware has new features, as the capability to steal WiFi profiles. It’s .NET based and all the strings are decrypted by Rijndael algorithm.
The cyber security experts: The Pakistan-based group used a spear phishing email with a link to a malicious document masquerading as the government of India to spread the malware.
Joint analysis by Malwarebytes and HYAS cyber security experts: Significant similarities between the registration information for domain names used in their infrastructure by both groups.
Malwarebytes cyber security expert Jerome Segura: Magecart groups inject credit card stealer scripts within every page of the hacked websites and configured it to pop-up.