Experts see North Korea connection in corrupted malware analysis tool
Researchers say Lazarus Group targeted security professionals in latest attempt to steal confidential information
A North Korea-linked hacking group is likely behind an infected version of a popular software analysis tool, a cybersecurity research group has found, in the second DPRK attack against cybersecurity professionals uncovered this year.
Slovakia-based ESET Research Labs (ESET) announced on Wednesday that it has discovered an infected installer for IDA Pro 7.5, a tool that allows researchers to translate binary computer code — especially from malware — into assembly language, a form more readily-intelligible to humans.
In a tweet, ESET stated that “based on the domain and trojanized application, we attribute this malware to known Lazarus [Group
- 01Timeline: From COVID-19 vaccines to preparations to reopen North Korea’s border
- 02How has COVID-19 impacted North Korean market prices?
- 03Juche H-bomb: North Korea’s efforts to tie self-reliance to its nuclear weapons
- 04North Korea reels in cash from fishing permits this year, despite UN ban
- 05Why America is fighting a losing battle against North Korean cyber crime
- 06North Korea warily eyes the markets that now dominate food distribution
- 07Political disputes leave US no closer to appointing DPRK human rights envoy
- 08Kim Jong Un builds new mansions across country as North Korean public suffers