In January, Google and Microsoft outed what they stated was North Korean government-sponsored hackers focusing on safety researchers. The hackers spent weeks utilizing faux Twitter profiles—purportedly belonging to vulnerability researchers—earlier than unleashing an Web Explorer zero-day and a malicious Visible Studio Challenge, each of which put in customized malware.
Now the identical hackers are again, a Google researcher said on Wednesday, this time with a brand new batch of social media profiles and a faux firm that claims to supply offensive safety providers, together with penetration testing, software program safety assessments, and software program exploits.
As soon as extra with feeling
The homepage for the faux firm is glossy and appears no completely different from numerous actual safety corporations everywhere in the world:
The hackers additionally cooked up greater than a dozen new social media profiles that presupposed to belong to recruiters for safety corporations, safety researchers, and numerous staff of SecuriElite, the faux safety firm. The work that went into creating the profiles was pretty spectacular.
My favourite is that this Twitter profile of @seb_lazar, which presumably corresponds to Sebastian Lazarescue, one of many faux researchers working for the faux SecuriElite:
Safety individuals all know that Lazarus is the identify used to determine hackers backed by the North Korean authorities. Growing detailed Twitter and LinkedIn profiles for a researcher along with your faux safety firm, naming him Sebastian Lazarescue, and having him retweeting a number of top-flight safety researchers—some who work for Google—is next-level trolling.
Adam Weidemann, a researcher with Google’s Risk Evaluation Group, cautions that the hackers’ previous success in luring researchers to web sites internet hosting an IE zero-day means the group ought to be taken significantly.
“Based mostly on their exercise, we proceed to imagine that these actors are harmful, and certain have extra 0-days,” he wrote.