Lazarus Group Exploits Log4j Vulnerabilities for Remote Access

The Lazarus Group, a North Korea-linked threat actor, has launched a global campaign exploiting security flaws in Log4j to deploy previously undocumented remote access trojans (RATs) on compromised hosts. The campaign, known as Operation Blacksmith, involves the use of DLang-based malware families, including a RAT called NineRAT that utilizes Telegram for command-and-control. The Lazarus Group's tactics overlap with the sub-group Andariel, which is responsible for initial access and espionage activities. The attacks target various sectors, including manufacturing, agriculture, and physical security. The group takes advantage of the widespread use of vulnerable versions of Log4j and employs multiple tools for persistent access.
- Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans The Hacker News
- Over 30% of Log4J apps use a vulnerable version of the library BleepingComputer
- North Korean hackers Lazarus Group takes new Telegram tactics SiliconANGLE News
- North Korean hacking ops continue to exploit Log4Shell CyberScoop
- Two years on, 1 in 4 apps still vulnerable to Log4Shell The Register
Reading Insights
0
0
3 min
vs 4 min read
86%
700 → 101 words
Want the full story? Read the original article
Read on The Hacker News