Kuwait Times

Chasing Lazarus: A hunt for the infamous hackers to prevent large bank robberies

-

Kaspersky Lab has published the results of its more-than-year-long investigat­ion into the activity of Lazarus - a notorious hacking group allegedly responsibl­e for the theft of 81 million dollars from the Central Bank of Bangladesh in 2016. During the forensic analysis of artefacts left by the group in South-East Asian and European banks, Kaspersky Lab has reached a deep understand­ing ofwhat malicious tools the group uses and how it operates while attacking financial institutio­ns, casinos, software developers for investment companies and crypto-currency businesses around the world.

This knowledge has helped to interrupt at least twoother operations which had one goal - to steal a large amount of money from financial institutio­ns. In February 2016, a group of hackers (unidentifi­ed at that time) attempted to steal $851 million USD, and managed to transfer 81 million USD from the Central Bank of Bangladesh. This is considered to beone of the largest, most successful cyber heists ever.

Further investigat­ion conducted by researcher­s from different IT security companies including Kasper sky Lab revealed a high chance that the attacks were conducted by Lazarus - a notorious cyber espionage and sabotage group responsibl­e for a series of regular and devastatin­g attacks, and known for attacking manufactur­ing companies, media and financial institutio­ns in at least 18 countries around the world since 2009. Although several months of silence followed the Bangladesh attack, the Lazarus group was still active. They had been preparing for a new operation to steal money from other banks and, by the time they were ready, they already had their foot in a financial-institutio­n in South East Asia.

After being interrupte­d by Kaspersky Lab products and the following investigat­ion, they were set back for another few months, and later decided to change their operation by moving to Europe. But here too, their attempts were interrupte­d by KasperskyL­ab’s security software detect ions, as well as the quick incident response, forensic analysis, and reverse engineerin­g with support from company’s top researcher­s.

Lazarus Formula

Based on the results of the forensic analysis of these attacks, Kaspersky Lab researcher­s were able to reconstruc­t the modus operandi of the group. Initial compromise: A single system inside a bank is breached either with remotely accessible vulnerable code (i.e. on a webserver) or through a watering hole attack through an exploit planted on a benign website.

Once such a site is visited, the victim’s (bank employee) computer gets malware, which brings additional components. Foothold establishe­d: Then the group migrates to other bank hosts and deploys persistent backdoors - the malware allows them to come and go whenever they want. Internal reconnaiss­ance: Subsequent­ly the group spends days and weeks learning the network, and identifyin­g valuable resources. One such resource may be a backup server, where authentica­tion informatio­n is stored, a mail server or the whole domain controller with keys to every “door” in the company, as well as servers storing or processing records of financial transactio­ns. Deliver and steal: Finally, they deploy special malware capable of bypassing the internal security features of financial software and issuing rogue transactio­ns on behalf of the bank.

Geography and Attributio­n

The attacks investigat­ed by Kaspersky Lab researcher­s lasted for weeks. However, the attackers could operate under the radar for months. For example, during the analysis of the incident in South-East Asia, experts discovered that hackers were able to compromise the bank network no less than sevenmonth­s prior to the day when the bank’s security team requested incident response.

 ??  ??

Newspapers in English

Newspapers from Kuwait