The cybersecurity firm ASEC has exposed the North Korean state-sponsored Lazarus APT group’s latest attack strategy, targeting Windows Internet Information Service (IIS) web servers to distribute malware.
Employing the watering hole technique, the attackers compromise Korean websites and modify their content to gain initial access, exploiting the vulnerability in the INISAFE CrossWeb EX V6. By deploying the JuicyPotato malware packed with Themida, Lazarus aims to escalate privileges and facilitate malicious activities.
Lazarus strategically deploys the SCSKAppLink.dll malware through the INISAFECrossWebEXSvc.exe vulnerability, acting as a downloader to fetch additional malware strains from external sources, granting the attackers control over compromised systems.
The group’s nefarious activities are a significant risk to both organizations and individuals, as highlighted by its involvement in high-profile breaches. The JumpCloud breach, attributed to Lazarus, led to JumpCloud resetting clients’ API keys and implementing precautionary measures to safeguard their systems. Moreover, Lazarus was suspected of being behind the recent attack on Atomic Wallet, resulting in the theft of over $35 million in cryptocurrency.
To counteract the threats posed by Lazarus and similar state-funded threat actors, organizations must adopt stringent security measures, including attack surface management, to identify exposed assets promptly.
Regularly applying the latest security patches and implementing proactive security practices are crucial to mitigating the risks associated with Lazarus’ sophisticated cyberattacks on Windows IIS web servers.