Kaspersky Lab researchers have prepared a report on the activity of the North Korean hack group Lazarus, which recently attacked two organizations participating in the COVID-19 study.
According to the company, new Lazarus attacks occurred in September and October 2020, targeting the Ministry of Health, as well as an unnamed pharmaceutical company authorized to manufacture and distribute COVID-19 vaccines, signaling a clear interest in coronavirus research by hackers.
The attack on the Ministry of Health was recorded on October 27, 2020: two Windows servers were hacked. Experts were unable to determine the initial vector of infection, but as a result of the incident, attackers were able to install a complex cluster of malware on compromised servers. Kaspersky Lab tracks this malware as wAgent, and was previously used to attack cryptocurrency companies. The main component of this malware works only in memory and receives additional payloads from the attacker’s remote server.
The second incident involved an unnamed pharmaceutical company and occurred on September 25, 2020. According to company telemetry, this time the Lazarus team deployed the Bookcode malware previously reported by ESET. The infection was due to an attack on the supply chain and hacking of a South Korean software company.
Both malware were designed to act as full-featured backdoors, giving their operators complete control over the infected machines. Each attack used different tactics, techniques and procedures, but the researchers believe that Lazarus is behind both incidents.
Using wAgent, the attackers executed various shell commands to collect information from victims’ machines. An additional payload was also deployed on the infected servers, including the mechanism of stable presence in the system. The BookCode backdoor, in turn, was used to collect system and network information from the victim’s network, as well as a SAM dump containing password hashes. The attacker also tried to gather information about other machines on the network, probably planning to develop the attack further.
“These two incidents demonstrate the interest of the Lazarus group in COVID-19-related data. While the group is mostly known for its financial attacks, this is a good reminder that it can also hunt for strategic research. We believe that all organizations that are currently involved in activities such as vaccine research or crisis management should be on high alert for cyber attacks, ”the experts write.