One Article Review

Accueil - L'article:
Source Blog.webp AhnLab
Identifiant 7747128
Date de publication 2022-10-31 01:57:31 (vue: 2022-10-31 02:05:18)
Titre A Case of Malware Infection by the Lazarus Attack Group Disabling Anti-Malware Programs With the BYOVD Technique
Texte In the ASEC blog post uploaded on April 2022 (New Malware of Lazarus Threat Actor Group Exploiting INITECH Process, https://asec.ahnlab.com/en/33801/), the team discussed the fact that the Lazarus attack group had been exploiting the INITECH process to infect systems with malware.  This article aims to cover the details of the Lazarus group using the watering hole technique to hack into systems before exploiting the vulnerability of the MagicLine4NX product from Dream Security in order to additionally hack into systems in...
Notes
Envoyé Oui
Condensat 2022 actor additionally ahnlab aims anti april article asec attack been before blog byovd case com/en/33801/ cover details disabling discussed dream exploiting fact from group hack had hole https://asec infect infection initech lazarus magicline4nx malware new order post process product programs security systems team technique threat uploaded using vulnerability watering
Tags Malware Hack Vulnerability Threat Medical
Stories APT 38
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: