Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Microsoft Threat Intelligence Center reports a supply chain attack by a North Korean hacking group
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Microsoft Threat Intelligence Center reports a supply chain attack by a North Korean hacking group

Highlights

  • In a recent development, Microsoft Threat Intelligence Center has reported a sophisticated supply chain attack orchestrated by a North Korean hacking group. The attackers have ingeniously modified a legitimate installer from Taiwanese software company CyberLink Corp., distributing malware in what appears to be a far-reaching cyberespionage campaign. ContentsModus Operandi of the AttackGlobal Impact and ResponseLazarus: […]
Bilgesu Erdem
Last updated: 23 November, 2023 - 12:37 pm 12:37 pm
Bilgesu Erdem 2 years ago
Share
SHARE

In a recent development, Microsoft Threat Intelligence Center has reported a sophisticated supply chain attack orchestrated by a North Korean hacking group. The attackers have ingeniously modified a legitimate installer from Taiwanese software company CyberLink Corp., distributing malware in what appears to be a far-reaching cyberespionage campaign.

Contents
Modus Operandi of the AttackGlobal Impact and ResponseLazarus: The Notorious CulpritImplications and Considerations

Modus Operandi of the Attack

The operation, attributed with high confidence to the North Korean group known as Diamond Sleet, involved a deceptively genuine CyberLink software installer. Although signed with a valid CyberLink certificate, the installer harbored LambLoad, a dual-function malware designed as both a downloader and a loader. Remarkably, LambLoad is configured to activate only within a specific timeframe and under certain conditions. It deliberately avoids systems protected by leading security firms like FireEye Inc., CrowdStrike Holdings Inc., and Tanium Inc., showcasing an unprecedented level of sophistication in evading detection.

Global Impact and Response

The compromised installer has impacted over 100 devices across multiple countries, including Japan, Taiwan, Canada, and the United States, since first observed on October 20, 2023. Microsoft has taken proactive measures, including updating its Defender for Endpoint and Antivirus solutions to counteract this threat. Affected customers have been notified, and the malicious CyberLink certificate has been disallowed for future use.

Lazarus: The Notorious Culprit

The Lazarus Group, often linked to Diamond Sleet, is infamous in the cybersecurity world. Known for its involvement in the 2017 WannaCry ransomware and the theft of $615 million in cryptocurrency from the Ronin Network, their tactics often involve leveraging legitimate software to deploy their attacks. This recent incident further exemplifies their evolving strategies in targeting corporate networks and individual users alike.

Implications and Considerations

The attack raises significant concerns about the security of supply chains and the ease with which legitimate software can be weaponized. Microsoft’s revelation underscores the need for heightened vigilance in the cybersecurity domain, especially for multinational companies and those involved in sensitive sectors.

While CyberLink has not responded to inquiries, the episode has drawn attention to the continuous and evolving threats posed by state-sponsored hacking groups. The sophistication and stealth of such attacks necessitate a reevaluation of security strategies, emphasizing the importance of collaborative efforts among corporations and cybersecurity experts to combat these emerging challenges.

As we witness the unfolding of this event, it becomes evident that the landscape of cyber warfare is evolving rapidly, with attackers becoming increasingly adept at exploiting vulnerabilities in widely-used software. The need for constant vigilance and innovative security measures has never been more critical in safeguarding against such advanced threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Cyberattack Hits Aflac as Threats Target Insurance Industry

Hackers Drain $90 Million from Nobitex in Iran Cyberattacks

Researchers Expose Grok and Mixtral as Sources for Jailbroken AI Tools

Hacktivists Strike Bank Sepah, Disrupt Iran’s Key Financial Services

Cyber Experts Urge Stronger Volunteer Networks to Safeguard Key Groups

Share This Article
Facebook Twitter Copy Link Print
By Bilgesu Erdem
Bilgesu graduated from Ankara University, Faculty of Communication, Department of Radio, Television and Cinema. After working as a reporter for various television channels and a newspaper, Bilgesu is currently working as a content editor at Newslinker. She loves technology and animals.
Previous Article Are there salt glaciers and potentially hidden pockets of life on Mercury?
Next Article Elon Musk announces the return of article titles to URL cards in X

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Sega Discloses Major Game Sales Figures in Accidental Leak
Gaming
Tesla Rolls Out Driverless Robotaxi Service in Austin
Electric Vehicle
Tesla Launches Robotaxi Service for Public Rides in Austin
Electric Vehicle
FDA Grants Levita Magnetics Expanded Clearance for MARS Robotic System
Robotics
Developer Ends Dreamsettler Sequel After Key Feature Cut
Gaming
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?