High
Potential DTRACK dumps the data mined output via manually mapped share over SMB to RFC1918 address with a statically encoded user/pass, containing the hard-coded username and password likely stolen from an Indian nuclear plant operator.
Lazarus has been active in the South Asian region targeting different facilities in India, Pakistan and Bangladesh. This time they’ve hit the nuclear facility in India, a second 1,000 MW nuclear power unit at Kudankulam, owned by the Nuclear Power Corporation of India Ltd. The atomic power plant stopped generation about 12.30 a.m. on Saturday owing to “Steam Generation level low”, the company added.
Exposure of sensitive information
SHA256
Block all threat indicators at your respective controls.