Rewterz Threat Alert – Lockbit Ransomware – Active IOCs
January 27, 2023Rewterz Threat Alert – Agent Tesla Malware – Active IOCs
January 28, 2023Rewterz Threat Alert – Lockbit Ransomware – Active IOCs
January 27, 2023Rewterz Threat Alert – Agent Tesla Malware – Active IOCs
January 28, 2023Severity
High
Analysis Summary
Lazarus APT is one of North Korea’s most sophisticated threat actors, operating since at least 2009. Initially, they concentrated on South Korea. It has recently shifted its focus to worldwide targets and began initiating assaults for monetary gain. This actor has been linked to attacks in South Korea, the United States, Japan, and a number of other nations. Lazarus APT is suspected of being behind a number of diverse efforts, including cyber espionage, attacks on financial institutions, government agencies, and the military.
The Lazarus group has been known to use a variety of tactics, techniques, and procedures (TTPs) in their operations, including spear-phishing, malware, and social engineering. One of their recent campaigns, known as “Dream Job,” specifically targets cryptocurrency-adjacent entities by impersonating legitimate job recruiters and tricking individuals into downloading malware.
It is important for organizations and individuals to be aware of these types of tactics and to take steps to protect themselves, such as implementing security best practices and being cautious of unsolicited emails or messages
Impact
- Information Theft and Espionage
- Exposure of Sensitive Data
Indicators of Compromise
MD5
- 1408fc1f200fb5b6396351c65c293f06
SHA-256
- c52028b494c37505cbe073e3b0fcdeb6b7b48636c6fd00a41108e6dc1a66a4ce
SHA-1
- f304c1d89b8b7b457a6df09323614c6d31da8e7f
Remediation
- Always be suspicious about emails sent by unknown senders.
- Never click on links/attachments sent by unknown senders.
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.