This week, ESET researchers unveiled their findings about an attack by the North Korea-linked APT group Lazarus that took aim at an aerospace company in Spain. The group obtained initial access to the company’s network after a successful spearphishing campaign where they masqueraded as a recruiter for Meta, the company behind Facebook, Instagram, and WhatsApp, and contacted the victim via LinkedIn Messaging. During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan.
Learn more about the backdoor and the attack's mechanics in the video and make sure to give the full blogpost a read here:
Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company
Connect with us on Facebook, Twitter, LinkedIn and Instagram.