In January, Google and Microsoft outed what they stated was North Korean government-sponsored hackers concentrating on safety researchers. The hackers spent weeks utilizing faux Twitter profiles—purportedly belonging to vulnerability researchers—earlier than unleashing an Internet Explorer zero-day and a malicious Visual Studio Project, each of which put in customized malware.
Now the identical hackers are again, a Google researcher said on Wednesday, this time with a new batch of social media profiles and a faux firm that claims to supply offensive safety companies, together with penetration testing, software program safety assessments, and software program exploits.
Once extra with feeling
The homepage for the faux firm is smooth and appears no completely different from numerous actual safety firms all around the world:
The hackers additionally cooked up greater than a dozen new social media profiles that presupposed to belong to recruiters for safety firms, safety researchers, and varied workers of SecuriElite, the faux safety firm. The work that went into creating the profiles was pretty spectacular.
My favourite is that this Twitter profile of @seb_lazar, which presumably corresponds to Sebastian Lazarescue, one of many faux researchers working for the faux SecuriElite:
Security individuals all know that Lazarus is the identify used to establish hackers backed by the North Korean authorities. Developing detailed Twitter and LinkedIn profiles for a researcher along with your faux safety firm, naming him Sebastian Lazarescue, and having him retweeting plenty of top-flight safety researchers—some who work for Google—is next-level trolling.
Adam Weidemann, a researcher with Google’s Threat Analysis Group, cautions that the hackers’ previous success in luring researchers to web sites internet hosting an IE zero-day means the group ought to be taken critically.
“Based on their exercise, we proceed to consider that these actors are harmful, and certain have extra 0-days,” he wrote.