Lazarus Group Enhances Malware Toolkit with PondRAT, ThemeForestRAT, and RemotePE

Published:

spot_img

North Korean Lazarus Group’s Social Engineering Tactics Unveiled

The Rise of the Lazarus Group

The Lazarus Group, a notorious cyber threat actor linked to North Korea, has recently been highlighted for its sophisticated social engineering campaign. This initiative has involved deploying three distinct pieces of cross-platform malware: PondRAT, ThemeForestRAT, and RemotePE. These tools have been used to infiltrate organizations within the decentralized finance (DeFi) sector, posing significant risks to data security.

Targeting the DeFi Sector

In a cybersecurity assessment by NCC Group’s Fox-IT, the Lazarus Group effectively compromised an employee’s system within a targeted DeFi organization. The attack chain initiated with a clever impersonation of an employee via Telegram, leveraging deceptive websites designed to resemble known services like Calendly and Picktime for scheduling meetings with prospective victims. This method of impersonation underscores the importance of awareness in digital communication, especially within sensitive industries.

The Attack’s Mechanics

While the precise method of initial access remains unidentified, the attacker utilized this foothold to deploy a loader named PerfhLoader. This loader facilitated the introduction of PondRAT, which is noted to be a streamlined form of the POOLRAT malware. Preliminary evidence gathered by Fox-IT suggests that the attack may have exploited a zero-day vulnerability in the Chrome browser, further complicating defenses against such threats.

Deployment of Malware Tools

Along with PondRAT, several additional malware tools were delivered. These included a variety of utilities designed for harmful purposes, such as a screenshotter, keylogger, and credential stealers like Mimikatz. Additionally, several proxy tools, including MidProxy and Proxy Mini, were used to enhance the attacker’s operational stealth.

Functionality of PondRAT

PondRAT acts as a basic remote access tool (RAT), enabling operators to read and write files, initiate processes, and execute shell commands. According to Fox-IT, this malware variant has been in circulation since at least 2021. During the initial phase of the attack, PondRAT was used in conjunction with ThemeForestRAT for approximately three months, before transitioning to the more sophisticated RemotePE.

Communication and Commands

PondRAT is engineered to communicate via HTTP(S) with a hard-coded command-and-control (C2) server, from which it receives further instructions. Meanwhile, ThemeForestRAT is launched directly into the system’s memory, executed either by PondRAT or through a specific loader. This careful orchestration allows for stealthy operation and evasion from detection mechanisms.

Capabilities of ThemeForestRAT

Similar to its predecessor, ThemeForestRAT monitors for new Remote Desktop Protocol (RDP) sessions and interacts with its C2 server to retrieve a vast array of commands. These can include operations such as enumerating files and directories, executing commands, and even manipulating file attributes by time-stamping them based on other files present on the system.

Historical Context and Comparisons

Notably, Fox-IT has drawn parallels between ThemeForestRAT and another malware known as RomeoGolf, which was utilized by the Lazarus Group in the notorious 2014 cyberattack on Sony Pictures Entertainment. This comparison highlights an ongoing trend of technologically sophisticated and invasive tactics employed by this cyber group.

The Advanced RemotePE

RemotePE is another significant component, retrieved from the C2 server through a loader named RemotePELoader, with the loading process facilitated via DPAPILoader. Written in C++, RemotePE is noted for its advanced functionalities, frequently reserved for targets deemed high-value.

Conclusion on Attack Strategies

Fox-IT emphasizes that while PondRAT may appear primitive and offer limited functionality, it serves its purpose as an initial payload effectively. For more complex operations, the Lazarus Group relies on the more capable ThemeForestRAT, which allows them to operate under the radar, enhancing their chances of success against targeted organizations. Understanding these tactics is crucial for cybersecurity professionals as they develop defenses against increasingly sophisticated threat actors.

spot_img

Related articles

Recent articles

ServiceNow Completes Armis Acquisition, Strengthening Cyber Exposure Management and Asset Visibility

ServiceNow Completes Armis Acquisition, Strengthening Cyber Exposure Management and Asset Visibility ServiceNow has made a significant move in the cybersecurity landscape by completing its acquisition...

SystemBC C2 Server Exposes Over 1,570 Victims in The Gentlemen Ransomware Operation

SystemBC C2 Server Exposes Over 1,570 Victims in The Gentlemen Ransomware Operation Recent investigations have unveiled a significant cybersecurity threat linked to The Gentlemen ransomware-as-a-service...

Poste Italiane and Postepay Hit with €12.5M Fine for Unlawful Data Processing of Millions

Poste Italiane and Postepay Hit with €12.5M Fine for Unlawful Data Processing of Millions The Italian Data Protection Authority (Garante per la protezione dei dati...

UAE Cyber Security Council Warns 25% of Public Files Expose Sensitive Personal Data

UAE Cyber Security Council Warns 25% of Public Files Expose Sensitive Personal Data The UAE Cyber Security Council has issued a significant alert regarding the...