Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Women are breaking into the male-dominated Mexican regional music genre

October 27, 2025

Halloween pumpkins can be used for baking, compost or animal feed

October 27, 2025

Daylight saving time ends Sunday in the US

October 27, 2025
Facebook X (Twitter) Instagram
Trending
  • Women are breaking into the male-dominated Mexican regional music genre
  • Halloween pumpkins can be used for baking, compost or animal feed
  • Daylight saving time ends Sunday in the US
  • Billionaire Kwek Leng Beng’s CDL Sells 84% Of Residential Towers Amid Singapore Property Boom
  • Japan’s sushi legend in ‘Jiro Dreams of Sushi’ documentary turns 100
  • Louvre heist leaves a cultural wound — and may turn French Crown Jewels into legend
  • By the Numbers: Why trick-or-treaters may bag more gummy candy than chocolate this Halloween
  • Health providers turning to prescriptions to get people outside
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Monday, October 27
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days
Cybersecurity

South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days

By adminApril 25, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 86


At least six South Korean organizations in the financial, IT, semiconductor, software, and telecommunications sectors have been targeted in a recent campaign attributed to the North Korean APT Lazarus, Kaspersky reports.

While Lazarus’ targeting of South Korea is nothing new, the new attacks stand out because they combine a watering hole strategy with the exploitation of vulnerabilities in software used by organizations in the country.

As part of the campaign, dubbed Operation SyncHole, Lazarus exploited a vulnerability in Cross EX, an application used by South Korean companies to ensure that mandatory security software runs in browser environments.

The country’s internet environment requires that online banking and government websites use specific security software for anti-keylogging and certificate-based digital signatures. These applications run in the background to interact with the browser.

“The Lazarus group shows a strong grasp of these specifics and is using a South Korea-targeted strategy that combines vulnerabilities in such software with watering hole attacks,” Kaspersky notes.

Lazarus exploited Cross EX and a zero-day vulnerability in Innorix Agent to deploy malware on targeted organizations’ systems, the security firm says.

The infection chain was triggered after a user accessed several South Korean online media sites, with the ThreatNeedle malware deployed at the initial stage of the attack. A server-side script was used to filter the site’s visitors and redirect victims to an attacker-controlled domain.

“We assess with medium confidence that the redirected site may have executed a malicious script, targeting a potential flaw in Cross EX installed on the target PC, and launching malware,” Kaspersky says.

Advertisement. Scroll to continue reading.

The script executed the legitimate SyncHost process and injected ThreatNeedle and wAgent code into it, a technique common throughout all Operation SyncHole intrusions. At the next stage of the attack, the SignBT and CopperHedge malware families were executed.

As part of the attacks, Lazarus also employed the LPEClient tool to profile victims, the Agamemnon downloader, and a credential dumping tool, and exploited the Innorix Agent file transfer software (also mandatory in South Korea for specific financial and administrative tasks) to deploy malware on internal hosts.

The analysis of the SignBT and CopperHedge variants used in these attacks revealed not only that Lazarus has been fine-tuning its tools to efficiently evade detection, but also that it was performing internal reconnaissance by issuing various Windows commands manually.

Kaspersky identified six organizations targeted in Operation SyncHole, but says that the number of victims is likely much higher, given the broad use of the targeted applications across industries. The company notified KrCERT of the attacks and patches were released for the exploited bugs.

“Throughout this campaign, several malware samples were used that we managed to attribute to the Lazarus group through our ongoing and dedicated research conducted for a long time. Our attribution is supported by the historical use of the malware strains, as well as their TTPs, all of which have been well documented by numerous security solutions vendors and governments,” Kaspersky notes.

Related: Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks

Related: North Korean Hackers Targeting Freelance Software Developers

Related: Windows Zero-Day Attack Linked to North Korea’s Lazarus APT

Related: North Korea’s Lazarus Targets Energy Firms With Three RATs



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

Billionaire Kwek Leng Beng’s CDL Sells 84% Of Residential Towers Amid Singapore Property Boom

October 27, 2025

Buyers looking at the Zyon Grand sales gallery over the weekend launch.Courtesy of City DevelopmentsCity…

These Are The Billionaires Cutting Checks To Stop Zohran Mamdani

October 24, 2025

These Are The Billionaires Cutting Checks To Stop Zohran Mamdani

October 24, 2025

These Cane Sugar Barons Are Primed To Make Coca-Cola Great Again

October 22, 2025
Our Picks

Women are breaking into the male-dominated Mexican regional music genre

October 27, 2025

Halloween pumpkins can be used for baking, compost or animal feed

October 27, 2025

Daylight saving time ends Sunday in the US

October 27, 2025

Billionaire Kwek Leng Beng’s CDL Sells 84% Of Residential Towers Amid Singapore Property Boom

October 27, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.