A North Korean state-sponsored actor, Lazarus (more specifically, the Famous Chollima subgroup), has used a new Python-based remote access trojan (RAT) called PyLangGhost. This is a reimagination of the previous GoLangGhost, and it is presumed to have been made possible through AI-aided porting. Instead of employing the usual infection vectors such as pirated media or USB drives, attackers are resorting to social engineering techniques that mimic the appearance of mock job interviews or technical problems (i.e., mock camera/microphone errors). Targets are lured into executing a malicious script presented as a patch, which actually installs the PyLangGhost RAT and gives cyber attackers complete access to the system. Targets of this attack are mainly developers, executives, and professionals in the tech, financial, and cryptocurrency sectors. The RAT, after installation, employs a modular architecture to carry out system reconnaissance, browse data access (particularly cryptocurrency wallet), and sensitive file exfiltration. It uses PowerShell, VBScript, and an included Python environment to achieve persistence and evasion. PyLangGhost talks to C2 servers in plaintext over HTTP and applies weak obfuscation (RC4/MD5), making it stealthy at its initial stages. It uniquely has the ability to impersonate vital processes such as lsass.exe to gain privilege escalation and access to protected credentials. Strong employee cybersecurity training, particularly on unsolicited job interviews or script running, is recommended. Companies must have privilege limitations, detect anomalous outbound traffic, and harden browsers and endpoints. Behavioral-based sandbox detection and monitoring tools are necessary in discovering threats such as PyLangGhost, which usually evades static antivirus detection.
A large-scale phishing campaign has been identified leveraging RFQ (Request for Quotation) themed emails to distribute credential-stealing malware. Attackers disguise malicious HTM...
Two critical vulnerabilities in Progress ShareFile have been identified that can be chained to achieve pre-authentication remote code execution (RCE). Discovered by watchTowr resea...
The FBI has issued a warning highlighting potential security and privacy risks associated with widely used mobile applications developed by Chinese companies. These applications, a...