High
FASTCash schemes remotely compromise payment switch application servers within banks to facilitate fraudulent transactions. Lazarus has been targeting this fastcash schemes previous aly as well for their financial gains and targeting different banking sectors around the world.
In two different incidents, one employee was targeted by the alleged employment recruiter on a leading employment-oriented website. The threat actors might have spoofed an employee profile and lured user for offer of potential employment and eventually downloaded the malicious attachment to it’s machine. While in the second incident, a separate issuer in the AP region was targeted with the same FASTCash attributed malware variant. Unconfirmed that the threat actors have gained access to the targeted machine, it is likely that the threat actors used a social engineering scheme or phishing campaign to distribute the malicious cryptocurrency application, which was then executed by an employee at the targeted institution.
cryptoistic[.]co
107[.]173[.]214[.]176