Skip to content

Lazarus misuses legitimate security software in a supply-chain attack in South Korea, ESET Research discovers

BRATISLAVA – ESET researchers recently discovered attempts to deploy Lazarus malware via a supply-chain attack (on less secure parts of the supply network) in South Korea. In order to deliver its malware, the attackers used an unusual supply-chain mechanism, abusing legitimate South Korean security software and digital certificates stolen from two different companies. The attack was made easier for Lazarus since South Korean internet users are often asked to install additional security software when visiting government or internet banking websites.

“To understand this novel supply-chain attack, you should be aware that WIZVERA VeraPort, referred to as an integration installation program, is a South Korean application that helps manage such additional security software. When WIZVERA VeraPort is installed, users receive and install all necessary software required by a specific website. Minimal user interaction is required to start such software installation,” explains Anton Cherepanov, ESET researcher who led the investigation into the attack. “Usually this software is used by government and banking websites in South Korea. For some of these websites it’s mandatory to have WIZVERA VeraPort installed,” adds Cherepanov.

Additionally, the attackers used illegally obtained code-signing certificates in order to sign the malware samples. Interestingly, one of these certificates was issued to the U.S. branch of a South Korean security company. “The attackers camouflaged the Lazarus malware samples as legitimate software. These samples have similar file names, icons and resources as legitimate South Korean software,” says Peter Kálnai, ESET researcher who analyzed the Lazarus attack with Cherepanov. “It’s the combination of compromised websites with WIZVERA VeraPort support and specific VeraPort configuration options that allows attackers to perform this attack,” adds Kálnai.

ESET Research has strong indications to attribute the attack to Lazarus, as it is a continuation of what KrCERT has called Operation BookCodes, attributed to Lazarus by some in the cybersecurity research community. The other reasons are typical toolset characteristics; detection (many tools are already flagged as NukeSped by ESET); the fact that the attack took place in South Korea, where Lazarus is known to operate; the unusual and custom nature of the intrusion and encryption methods used; and the setup of network infrastructure.

It must be noted that the Lazarus toolset is extremely broad, and ESET believes there are numerous subgroups. Unlike toolsets used by some other cybercriminal groups, none of the source code of any Lazarus tools has ever been disclosed in a public leak.

For more technical details about the latest Lazarus supply-chain attack, read the blogpost “Lazarus supply-chain attack in South Korea” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Scale Computing HCI: Improving Performance for Remote Workers from the Data Center to the Edge

INDIANAPOLISNovember 10, 2020Scale Computing, a market leader in edge computing, virtualization and hyperconverged solutions, has introduced new HC3 infrastructure appliances that deliver the extra processing power of Nvidia GPUs. For power-users on virtual desktops or computing-intensive applications for design or analytics, the HC1250DFG and HC5250DFG appliances engage high-performance GPUs to provide increased speed and processing efficiency. Scale Computing is the only technology provider delivering high performance applications from the data center to the edge on the same software platform and interface.

As remote work becomes a long term reality, organizations continue to execute on getting systems in place to support all remote users, whether they leverage applications in the cloud or work with very high performance applications that require dedicated GPU and high frame buffer requirements for remote users hosted on premises. These HC3 hyperconverged appliances are designed to enhance support for performance-intensive use cases such as high density Virtual Desktop Infrastructure (VDI) deployments, 3D Imaging/Modeling, Analytics, Artificial Intelligence, and GIS. With flexible deployment options from one appliance to clusters of multiple appliances, these appliances provide a highly-available, high-performance, hyperconverged virtualization platform.

The new HC3 infrastructure appliances delivering the superior processing power from Nvidia GPUs join other recently introduced HCI appliances designed to meet the needs for performance computing for both the enterprise and the SMB and from the core data center to the edge.

  • The HC3250DF stands out from other HCI solutions designed for performance computing with its ease of use, and brings a high amount of speed, density, throughput, and power to enable VDI for many more users per node while keeping future growth in focus. Unlike more complex infrastructure solutions that try to emulate classic SAN storage infrastructure, the Scale Computing HC3250DF is easier to deploy, manage, scale out, and its NVMe storage architecture requires no manual configuration and consumes less system RAM, resulting in more RAM being available to virtual machines and their applications.
  • The HE150 appliance is a small, all-flash, NVMe storage-based compute appliance that delivers all of the simplicity, efficiency, and enterprise-ready virtualization associated with Scale Computing’s HC3 platform. Built specifically for sites that need highly available infrastructure, the HE150 can be deployed almost anywhere, without requiring a rack or server closet. Taking up only the space needed to stack three smartphones, it also includes high availability clustering, rolling upgrades and integrated data protection.

“Enterprise and SMB customers have a need for performance-intensive use cases, both in their data centers and at the edge,” commented Jeff Ready, CEO and co-founder, Scale Computing. “Scale Computing customers now don’t have to choose different platforms to manage their data center and edge computing needs, either for on site or remote workers The HC3 platform is able to handle any application needs necessary.”

All Scale Computing HC3 appliances feature intelligent automation for self-healing and high availability to keep clusters running through component and appliance failures, as well as integrated disaster recovery capabilities to protect data and workloads to remote sites for fast failover and recovery. These capabilities enable applications to achieve maximum uptime even when local IT resources and staff are scarce, making the HC1250DFG and HC5250DFG appliances ideal application platforms for core data center to edge computing use cases for retail, industrial, transportation, manufacturing, finance, healthcare, education, remote office/back office, and mobile platforms.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×