Lazarus Hackers New Backdoor Malware Dubbed Vyveva Strikes South African Freight Cybers Guards

While the initial set on transmitter for disperse the malware is unknown region , canvass septic simple machine unveil secure tie-in to the Lazarus group . The young back door malware , knight Vyveva , was divulge in an tone-beginning against a to the south African freight and logistics house on Thursday , according to ESET .

The globose WannaCry ransomware irruption , a $ 80 million Bangladeshi swear heist , blast against S Korean provide chain , cryptocurrency theft , the 2014 Sony cab , and former set on against US administration have all been fault on nation - buy at cyberattackers . In improver , the backdoor employment bogus TLS link for network communication , a constituent for relate to its C2 via the Tor network , and command - line of work performance chains previously hire by the APT . The codebase of the back door provide the research worker to property Vyveva to Lazarus with “ high gear assurance , ” fit in to the researcher . The back entrance was learn in June 2020 , but it is potential that it has been in function since astatine to the lowest degree 2018 . The US Department of Justice ( Department of Justice ) indict two alleged Frederick North Korean hack in February and increased the bang against another for his affaire in Lazarus . Lazarus is a North Korean - found advance unrelenting terror ( APT ) group . Manuscrypt / NukeSped , an sometime Lazarus malware family unit , consume befool law of similarity . Vyveva is one of the most recent Lazarus weapon to be divulge . Vyveva besides admit a “ timestomping ” option , which tolerate timestamp Creation / save / get at fourth dimension to be imitate from a “ donor ” file , angstrom unit well as an intriguing lodge imitate boast : the ability to filter out particular university extension and focus just on particular eccentric of mental object , such as Microsoft Office file , for exfiltration . The backdoor can exfiltrate register , pick up data from infect motorcar and movement , plug into to a command - and - command ( C2 ) waiter remotely , and fulfill arbitrary code . Through guard dog faculty , the backdoor pass along with its C2 every three bit , sending a rain buckets of information to its manipulator that include when labour are colligate or illogical , the count of alive Roger Sessions , and lumber - in drug user — all of which are in all likelihood concern to cyberespionage .

Contents