North Korean hacking group – Lasarus are currently running a targeted campaign against people in specific industry sectors via an elaborate social engineering campaign dubbed Operation DreamJob.

As the name suggests, the operation begins with identifying people who are seeking new employment via social media platforms such as LinkedIn and Facebook.

Victim selection

The Lasarus gang are scouring social media platforms looking for people in specific industries who appear to be open to new job opportunities and are then contacting them with the goal of convincing them to download documents with details of exciting opportunities.

Unfortunately, the files are compromised with malicious content, which when opened, install malware allowing the gang to infiltrate the device, and ultimately the network of the victim.

A recent attack using this approach was conducted against an Aerospace company in Spain.

The victim was approached on LinkedIn by one of the Lasarus gang who pretended to be a recruiter from Meta named Steve Dawson.

Reconstructed messages between Lasarus actor and victim

The attacker started a seemingly innocuous conversation with the victim which eventually progressed to asking the victim how proficient they were in C++ programming.

The attacker asked to victim to download some quizzes which were in the form of executables within ISO files.

When the malicious files were executed, an additional payload from the ISO file was silently installed onto the victim’s machine via DLL side-loading attack (mscoree.dll) using a legitimate program called PresentationHost.exe

The malicious payload is the NickelLoader malware loader which installs two backdoors, a variant of BlindingCan with toned-down functionality (miniBlindingCan) and a malware calledLightless Can.

The commands supported by miniBlindingCan are:

  • Send system details (computer name, Windows version, code page).
  • Update communication interval (value from C2 server).
  • Stop command execution.
  • Send 9,392-byte configuration to C2 server.
  • Update encrypted 9,392-byte configuration on file system.
  • Wait for the next command.
  • Update communication interval (from configuration).
  • Download & decrypt files from C2 server.
  • Execute the provided shellcode.
Attack chain to install malware on victim machine

The commands supported by LightlessCan include:

  • Mimic the ipconfig command from the Windows command prompt
  • Mimic the net command from the Windows prompt
  • Mimic the netsh advfirewall firewall command from the Windows prompt
  • Mimic the netstat command from the Windows prompt
  • Mimic the ping -6 command from the Windows prompt
  • Mimic the reg command from the Windows prompt
  • Mimic the sc command from the Windows prompt
  • Mimic the ping command from the Windows prompt
  • Mimic the tasklist command from the Windows prompt
  • Mimic the wmic process call create command from the Windows prompt
  • Mimic the nslookup command from the Windows Server prompt
  • Mimic the schtasks command from the Windows prompt
  • Mimic the systeminfo command from the Windows prompt
  • Mimic the arp command from the Windows prompt
  • Mimic the mkdir command from the Windows prompt

Same malware – different approach

One of the first attacks using this malware came in March of this year when a digitally signed and trojanised version of the 3CX Voice Over Internet Protocol (VOIP) desktop client was used to target the company’s customers in a supply chain attack.

Victims were attacked when they downloaded an update to the companies softphone app

Customers who use 3CX include American Express, Coca-Cola, McDonald’s, BMW, Honda, Air France, Toyota, Mercedes-Benz, IKEA, and the National Health Service.

The threat actors behind the attack targeted both Windows and macOS via the compromised 3CX softphone app.