Network Security, Threat Intelligence, Malware

Novel Kaolin RAT malware distributed in Lazarus Group attacks

Share
North Korea flag with circuitry and fingerprint

Attacks leveraging fraudulent job lures to distribute the new Kaolin RAT malware have been launched by North Korean hacking collective Lazarus Group against individuals across Asia last summer, reports The Hacker News.

Social engineering techniques have been used by Lazarus Group to lure targets into executing a malicious optical disc image file with an executable spoofing an Amazon VNC client, which when run triggers a process that eventually results in malicious payload injection, according to a report from Avast. Such a payload then enables the download of a shellcode, which executes the RollFling loader with the next-stage RollSling malware and RollMid loader.

Researchers also noted the use of RollMid to deploy Kaolin RAT, which not only launches the FudModule rootkit but also proceeds with file enumeration and uploading activities, as well as process creation and termination, DLL file downloading, command execution, and arbitrary host connections.

"…Lazarus had to innovate continuously and allocate enormous resources to research various aspects of Windows mitigations and security products. Their ability to adapt and evolve poses a significant challenge to cybersecurity efforts," said researchers.

Novel Kaolin RAT malware distributed in Lazarus Group attacks

Attacks leveraging fraudulent job lures to distribute the new Kaolin RAT malware have been launched by North Korean hacking collective Lazarus Group against individuals across Asia last summer, reports The Hacker News.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.