Lazarus hackers now push Linux malware via fake job offers

Lazarus

A new Lazarus campaign considered part of “Operation DreamJob” has been discovered targeting Linux users with malware for the first time.

This new targeting was discovered by ESET’s researchers, who say it also helps confirm with high confidence that Lazarus conducted the recent supply-chain attack on VoIP provider 3CX.

The attack was discovered in March 2023, compromising multiple companies that used the trojanized version of the 3CX client with information-stealing trojans.

Lazarus was already suspected of being responsible for the attack, while multiple cybersecurity companies agreed with high confidence that the threat actor who trojanized 3CX was of North Korean nexus.

Today, Mandiant published the results of their investigation into the 3CX breach, further linking the attack to North Korean threat actors.

Mandiant says 3CX’s developer environment was compromised after an employee installed trading software from Trading Technologies, whose installer had been trojanized in another North Korean supply chain attack.

Operation DreamJob on Linux

Lazarus’ Operation DreamJob, also known as Nukesped, is an ongoing operation targeting people who work in software or DeFi platforms with fake job offers on LinkedIn or other social media and communication platforms.

These social engineering attacks attempt to trick victims into downloading malicious files masqueraded as documents that contain details about the offered position. However, these documents instead drop malware on the victim’s computer.

In the case discovered by ESET, Lazarus distributes a ZIP archive named “HSBC job offer.pdf.zip” through spearphishing or direct messages on LinkedIn.

Inside the archive hides a Go-written Linux binary that uses a Unicode character on its name to make it appear like a PDF.

“Interestingly, the file extension is not .pdf. This is because the apparent dot character in the filename is a leader dot represented by the U+2024 Unicode character,” explains ESET.

“The use of the leader dot in the filename was probably an attempt to trick the file manager into treating the file as an executable instead of a PDF.”

“This could cause the file to run when double-clicked instead of opening it with a PDF viewer.”

When the recipient double-clicks on the file to launch it, the malware, known as “OdicLoader,” displays a decoy PDF while simultaneously downloading a second-stage malware payload from a private repository hosted on the OpenDrive cloud service.

The decoy PDF displayed to the target
The decoy PDF displayed to the target (ESET)

The second-stage payload is a C++ backdoor called “SimplexTea,” which is dropped at “~/.config/guiconfigd. SimplexTea.”

OdicLoader also modifies the user’s ~/.bash_profile to ensure that SimplexTea is launched with Bash and its output is muted whenever the user starts a new shell session.

Lazarus' latest attack chain
Lazarus’ latest attack chain against Linux targets (ESET)

The 3CX connection

Upon analysis of SimplexTea, ESET determined it is very similar in functionality, encryption techniques, and hardcoded infrastructure used with Lazarus’ Windows malware named “BadCall,” as well as the macOS variant called “SimpleSea.”

Also, ESET found an earlier variant of the SimplexTea malware on VirusTotal, named “sysnetd,” which is also similar to the mentioned backdoors but written in C.

Domains used for fake TLS connections
Domains used for fake TLS connections (left – BadCall, right – sysnetd) (ESET)

That earlier variant loads its configuration from a file named /tmp/vgauthsvclog, which is used by the VMware Guest Authentication service. This suggests that the targeted system may be a Linux VMware virtual machine.

ESET analysts also found that the sysnetd backdoor uses an XOR key previously uncovered by the 3CX investigation to be used by the SimpleSea malware.

“Taking a look at the three 32-bit integers, 0xC2B45678, 0x90ABCDEF, and 0xFE268455 from Figure 5, which represent a key for a custom implementation of the A5/1 cipher, we realized that the same algorithm and the identical keys were used in Windows malware that dates back to the end of 2014 and was involved in one of the most notorious Lazarus cases: the cybersabotage of Sony Pictures Entertainment,” explained ESET.

The XOR key between SimplexTea and SimpleSea payloads differs; however, the configuration file uses the same name, “apdl.cf.”

Lazarus’ shift to Linux malware and the 3CX attack illustrates their ever-evolving tactics, now supporting all major operating systems, including Windows and macOS.

Similar Lazarus Operation DreamJob attacks have led to enormous success for the threat actors, allowing them to steal $620 million from Axie Infinity.

The FBI also confirmed Lazarus was behind the $100 million cryptocurrency theft from the Harmony Bridge.

Lazarus’ recent supply-chain attack on 3CX marks another high-profile success for the notorious cyber gang.


Original Source


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

Buy Me A Coffee
Patreon

 To keep up to date follow us on the below channels.

join
Telegram
discord
Discord
reddit
Reddit
linkedin
LinkedIn