Source |
The Hacker News |
Identifiant |
8338945 |
Date de publication |
2023-05-24 13:00:00 (vue: 2023-05-24 08:06:36) |
Titre |
Le groupe coréen Lazarus cible les serveurs Microsoft IIS pour déployer des logiciels malveillants d'espionnage N. Korean Lazarus Group Targets Microsoft IIS Servers to Deploy Espionage Malware |
Texte |
Le tristement célèbre acteur du groupe Lazarus a ciblé les versions vulnérables des serveurs Microsoft Internet Information Services (IIS) comme voie de violation initiale pour déployer des logiciels malveillants sur des systèmes ciblés.
Les résultats proviennent du Ahnlab Security Emergency Response Center (ASEC), qui a détaillé la poursuite de la menace persistante avancée (APT) Abus continu des techniques de chargement secondaire DLL pour déployer des logiciels malveillants.
"Le
The infamous Lazarus Group actor has been targeting vulnerable versions of Microsoft Internet Information Services (IIS) servers as an initial breach route to deploy malware on targeted systems.
The findings come from the AhnLab Security Emergency response Center (ASEC), which detailed the advanced persistent threat\'s (APT) continued abuse of DLL side-loading techniques to deploy malware.
"The |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
abuse actor advanced ahnlab apt asec been breach center come continued deploy detailed dll emergency espionage findings from group has iis infamous information initial internet korean lazarus lazarusgroup loading malware microsoft persistent response route security servers services side systems targeted targeting targets techniques threat versions vulnerable which |
Tags |
Malware
|
Stories |
APT 38
|
Move |
|