North Korea State-Proposed Mega-Hackers Lazarus Group has scammed a Canadian online gambling firm. [Image: Shutterstock.com]
Lazor Return
An Ottawa Cyber Security firm has revealed that an anonymous Canadian online gambling company was recently targeted by North Korea State-provided mega-hicchers, a subsidiary of the Lazarus Group.
According to the Security firm Field Effect, Lazarum Sub-Brand Bluenoroff used through zoom call “” social engineering strategy “to control the victim’s computer and deploy Infoselor Malware.
Zoom Audio Repair Tool Trojan Horse Script
Bluenoroff allegedly used a fake domain to cheat the Ottawa gambling firm during a scheduled cryptocurrency-related zoom meeting. The hacker assured the victim due to audio issues to run a zoom audio repair equipment, which was in fact, a malicious Trojan Horse Script.
Field Effect stated that hackers “with sensitive individual and system data, with clear attention to cryptocurrency-related assets.”
Detailed scam
A news release revealed that Bluenoroff Canadian gambling firm cheated By implementing reliable contacts and setting up a website that throws a zoom support page.
Hackers used deep-leafy technology to establish the trust as commercial contact.
Script as a zoom audio repair tool
“During the call, the victim experienced audio issues and several pop-up warnings. The other participant then motivated the victim to run a script as a zoom audio repair tool,” said the Field Effect.
Once downloaded, a second script was kicked, in which Canada employee was asked for credentials. Field Effect stated that hackers “used an employee and a loader to a fully depicted malware implant used the employee’s credibility in the following command when downloading and executing it.
Breach allowed Bloonoroff to extract sensitive information from the gambling firm, including “browser data and user kechen files”.
Big picture
The cyber security firm attributed Hack to a broad zoom scam campaign mainly focused on Crypto businesses in March.
The security company said, “It gives an example of a developed pattern in which an economically induced actor refines his tradecraft, embedding malicious activity within a legitimate business workflows and user exploits the trust as a surface of the primary attack,” the security company said.