Experts see North Korea connection in corrupted malware analysis tool
Researchers say Lazarus Group targeted security professionals in latest attempt to steal confidential information
A North Korea-linked hacking group is likely behind an infected version of a popular software analysis tool, a cybersecurity research group has found, in the second DPRK attack against cybersecurity professionals uncovered this year.
Slovakia-based ESET Research Labs (ESET) announced on Wednesday that it has discovered an infected installer for IDA Pro 7.5, a tool that allows researchers to translate binary computer code — especially from malware — into assembly language, a form more readily-intelligible to humans.
In a tweet, ESET stated that “based on the domain and trojanized application, we attribute this malware to known Lazarus [Group
- 01What a recent funeral in North Korea says about leadership in Pyongyang
- 02Why Biden and Yoon’s vow to bolster deterrence won’t alter North Korea’s course
- 03North Korea’s fertilizer imports remain unusually low ahead of planting seasons
- 04State media review: North Korea’s propaganda war against COVID-19
- 05Four major trends revealed by North Korea’s COVID-19 case numbers
- 06Streets empty but construction, farming active in COVID-hit North Korea: Imagery
- 07What North Korea will and will not do to fight the COVID-19 outbreak
- 08State media review: Pandemic and drought conspire in North Korea