• About
  • Advertise
  • Careers
  • Contact Us
Monday, June 23, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
ADVERTISEMENT
Home Business Security

Experts Reveal How ‘Lazarus’ Attacks Aerospace, Defense Contractors

by Yinka Okeowo
June 14, 2022
in Security
4
UBA
Advertisements

One of the intriguing sessions at the ESET World 2022 conference was the presentation of new research by ESET specialists with particular focus on the infamous Lazarus APT group.

  • For fake recruitment campaigns, they used services like LinkedIn and WhatsApp.
  • According to the US government, Lazarus is linked to the North Korean regime.

Jean-Ian Boutin, ESET Threat Research Director reviewed new campaigns perpetrated by the Lazarus group against defense contractors around the world between the end of 2021 and March 2022.

Lazarus targeted companies in Europe (France, Italy, Germany, the Netherlands, Poland, and Ukraine) and Latin America (Brazil) from 2021-2022, according to the ESET report. Despite the fact that the main objective of this Lazarus operation is cyber espionage, the group also tried to extract money from the prey, but without success. 

In Jean-Ian Boutin’s words: “The Lazarus threat group showed their ingenuity by implementing an interesting set of tools, including, for example, a user-mode component capable of exploiting a vulnerable Dell driver to write to kernel memory. This advanced hack was used in an attempt to bypass monitoring by security solutions”.

During 2020, ESET specialists had documented a campaign carried out by a Lazarus subgroup against European aerospace and defense contractors, ESET called Operation In(ter)ception. 

This campaign was notable in that it used social media, especially LinkedIn, to build trust between the attacker and an unsuspecting employee before sending them malicious components disguised as job descriptions or applications. 

At that time, companies from Brazil, the Czech Republic, Qatar, Turkey and Ukraine had already been attacked.

The ESET research team believed that the action was primarily aimed at targeting European companies, but tracking various Lazarus subgroups conducting similar campaigns against defense contractors, they soon realized that the campaign went much further. 

Although the types of malware used in the various campaigns were different, the initial modus operandi was always the same: a fake recruiter contacted an employee through LinkedIn and ultimately sent malicious components.

In this sense, the group continued with the same methodology as in the past. However, ESET documented the reuse of legitimate recruitment campaign elements to add legitimacy to their fake recruiters’ campaigns. Furthermore, the attackers used services such as WhatsApp or Slack in their malicious campaigns.

In 2021, the US Department of Justice charged three IT programmers with cyberattacks while working for the North Korean military. 

According to the US government, they belonged to the North Korean military hacker unit known in the information security community as the Lazarus Group.

Along with the new research from Lazarus, during the annual conference, ESET presented its report on “Cyber warfare past and present in Ukraine”. 

Also, Robert Lipovský, ESET researcher took an in-depth look at cyber warfare during Russia’s war against Ukraine, including the latest attempt to disrupt the country’s power grid using Industroyer2 and various wiper attacks.

Commenting on this subject, Mr. Olufemi Ake, the Managing Director of ESET West Africa (Anglophone), stated that: “The Lazarus group is a menacing Advanced Persistent Threat (APT) that must not be taken with levity. Its footprints in Africa are becoming more eminent and its tactics – more intelligent. It’s high time that organizations and government bodies adhered strictly to security compliance policies, and train employees on safe practices in the cyberspace.”

Alongside the ESET research team, Canadian astronaut Chris Hadfield, former Commander of the International Space Station and a key figure in ESET’s Progress Protected campaign, joined ESET CEO Richard Marko to discuss the intricacies of the technology, science and life.

For more than 30 years, ESET has been developing industry-leading IT security software and services to protect businesses, critical infrastructure and consumers worldwide from increasingly sophisticated digital threats.

From endpoint and mobile security to endpoint detection and response, as well as encryption and multifactor authentication, ESET’s high performing, easy-to-use solutions unobtrusively protect and monitor 24/7, updating defenses in real time to keep users safe and businesses running without interruption. 

Loading

Advertisements
MTN ADS

Author

  • Yinka Okeowo
    Yinka Okeowo

    View all posts
0Shares
Tags: ESETESET Olufemi AkeESET World 2022Lazarus GroupOlufemi Ake
Yinka Okeowo

Yinka Okeowo

Next Post

MFS Africa Secures Additional $100 million in Equity, Debt Funding

Comments 4

  1. Pingback: Experts Reveal How ‘Lazarus’ Attacks Aerospace, Defense Contractors – TechEconomy.ng | #cybersecurity | #cyberattack - NATIONAL CYBER SECURITY NEWS TODAY
  2. Pingback: ESET Sponsors CSEAN Cyber Secure Nigeria 2022 Conference – TechEconomy.ng
  3. Pingback: ESET Sponsors CSEAN Cyber Secure Nigeria 2022 Conference – TechEconomy.ng - Cloud Defense - Cloud Security
  4. Pingback: ESET Sponsors CSEAN Cyber Secure Nigeria 2022 Conference - News Curators

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recommended

Union Bank Raises Staff Salaries by 40%, Personnel Expenses to ₦47.6 Billion

Union Bank Raises Staff Salaries by 40%, Personnel Expenses to ₦47.6 Billion

7 months ago
Africa Internet Governance Forum (AfIGF) 2023

Nigeria Hosts 54 Countries, others to Africa Internet Governance Forum (AfIGF) 2023

2 years ago

Popular News

    Connect with us

    • About
    • Advertise
    • Careers
    • Contact Us

    © 2025 TECHECONOMY.

    No Result
    View All Result
    • News
    • Tech
      • DisruptiveTECH
      • ConsumerTech
      • How To
      • TechTAINMENT
    • Business
      • Telecoms
      • Mobility
      • Environment
      • Travel
      • StartUPs
        • Chidiverse
      • TE Insights
      • Security
    • Partners
    • Economy
      • Finance
      • Fintech
      • Digital Assets
      • Personal Finance
      • Insurance
    • Features
      • IndustryINFLUENCERS
      • Guest Writer
      • EventDIARY
      • Editorial
      • Appointment
    • TECHECONOMY TV
    • Apply
    • TBS
    • BusinesSENSE For SMEs

    © 2025 TECHECONOMY.

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    Translate »
    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.