Anticipating that North Korea will continue to use the Lazarus Group to advance the dictatorship’s military and strategic objectives, U.S. authorities issued a report Tuesday identifying new details on the tools and infrastructure used by North Korea’s digital army. The technical alert, produced by the Department of Homeland Security’s Computer Emergency and Response Team and the Federal Bureau of Investigation, identified with “high confidence” IP addresses and malware called DeltaCharlie that the hacking group allegedly uses to manage its botnet infrastructure. The report includes numerous indicators of compromise meant to aid defenders targeted by the group. Lazarus, which the new report refers to as HIDDEN COBRA, has been implicated in a series of multibillion-dollar bank thefts across 18 countries as well as attacks against “media, aerospace, financial, and critical infrastructure sectors in the United States and globally.” “Tools and capabilities used by HIDDEN COBRA actors include DDoS botnets, keyloggers, remote access tools […]
The post DHS identifies North Korean hacking infrastructure used by Lazarus Group appeared first on Cyberscoop.
Continue reading DHS identifies North Korean hacking infrastructure used by Lazarus Group→