The Lazarus threat actor group has developed the ability to attack supply chains, signaling the notorious crew has expanded its roster of potential targets, according to a new Kaspersky report.
Such is the threat of supply chain attacks--as emboldened by the successful SolarWinds assault--that the Cybersecurity and Infrastructure Agency (CISA) last month released a new framework for government and private sector organizations on how to engage with managed security service providers (MSSPs) and managed service providers (MSPs) to minimize supply risk and improve overall security.
The North-Korea tied Lazarus is also using its multi-platform (Windows, Linux and MacOS) MATA platform to conduct cyber espionage in the defense industry, one of its favored targets, Kaspersky said.
How Lazarus Hacker Group Allegedly Operates
Here’s what Kaspersky has allegedly turned up on Lazarus:
“These recent developments highlight two things: Lazarus remains interested in the defense industry and is also looking to expand its capabilities with supply chain attacks,” said Ariel Jungheit, a senior security researcher on Kaspersky’s Global Research and Analysis Team. “This APT group is not the only one seen using supply chain attacks. In the past quarter we have also tracked such attacks carried out by SmudgeX and BountyGlad,” Jungheit said.
How MSSPs Can Mitigate Lazarus Group Cyberattack Threats
Kaspersky recommends that organizations take these five measures to avoid being victimized by a targeted attack:
Lazarus has been among the world’s most active cyber attackers for more than a decade. Not only has it conducted large scale cyber espionage and ransomware campaigns, it has also attacked the defense industry and cryptocurrency markets. The group has been tied to a number of high profile offensives, including: