State-sponsored hackers exploit zero-day vulnerabilities to target security researchers

Google's Threat Analysis Group (TAG) has reported that state-sponsored hackers from North Korea are targeting security researchers using at least one zero-day exploit in an undisclosed popular software. The attackers use social media platforms like Twitter and Mastodon to establish contact with the researchers and then send them malicious files designed to exploit the zero-day. The payload collects information from the researchers' systems and sends it to the attackers' command and control servers. This campaign is similar to previous attacks in January 2021, indicating the involvement of the Lazarus Group. The primary objective of these attacks appears to be the acquisition of undisclosed security vulnerabilities and exploits.
- Google: State hackers attack security researchers with new zero-day BleepingComputer
- North Korea-backed hackers target security researchers with 0-day Ars Technica
- North Korean Hackers Use Zero-Day Exploit to Hit Security Researchers PCMag
- North Korean Hackers Target Security Researchers — Again DARKReading
- Rigged Software and Zero-Days: North Korean APT Caught Hacking Security Researchers SecurityWeek
- View Full Coverage on Google News
Reading Insights
0
0
2 min
vs 3 min read
78%
476 → 107 words
Want the full story? Read the original article
Read on BleepingComputer